just now

Cloud Storage and User Authentication Compromises: Managing the Integrity of Your Data

Often in the information security industry, professionals can be accused of spreading fear, uncertainty, and doubt with cybersecurity concerns. However, considering the implications of integrity attacks, it is essential to pay close attention to them....

Listen to this episode

0:00 / 0:00

Summary

First published

11/27/2017

Genres

technology business

Tags

Indigenous Mental Health Systemic Trauma Colonization Effects Mental Health Disparities Stolen Generations Cultural Reconciliation Invisible Epidemic Resilience Building

Duration

15 minutes

Parent Podcast

Cybersecurity Sense

View Podcast

Share this episode

Similar Episodes

  • Ep. 50 - [Clint Bodungen] Cybersecurity & Gamification to Industrial Cybersecurity.

    03/03/2022

    Vlad Romanov & Dave Griffith

    Guest BioClint is a world-renowned industrial cybersecurity expert, public speaker, published author, and cybersecurity gamification pioneer. He is the lead author of Hacking Exposed: Industrial Control Systems, and creator of the ThreatGEN® Red vs. Blue cybersecurity gamification platform. He is a United States Air Force veteran, has been a cybersecurity professional for more than 25 years, and is an active part of the cybersecurity community, especially in ICS/OT (BEER-ISAC #046). Focusing exclusively on ICS/OT cybersecurity since 2003, he has helped many of the world's largest energy companies, worked for cybersecurity companies such as Symantec, Kaspersky Lab, and Industrial Defender, and has published multiple technical papers and training courses on ICS/OT cybersecurity vulnerability assessment, penetration testing, and risk management. Clint hopes to revolutionize the industry approach to cybersecurity education and help usher in the next generation of cybersecurity professionals, using gamification. His flagship product, ThreatGEN® Red vs. Blue, is the world’s first online multiplayer cybersecurity computer game, designed to teach real-world cybersecurity.Main Discussion Points- Industrial Cybersecurity- Gamification of Cybersecurity Awareness- Building Knowledge in CybersecurityTheme: Industrial CybersecurityManufacturing Hub Episode 50.Special thanks to our sponsors Phoenix Contact for the support.The mGuard family from Phoenix Contact is designed to provide cybersecurity protection and network resilience in all rugged and industrial environments.  Combining features of a stateful-packet-inspection firewall, NAT Router, and an end-point security appliance, the mGuards were engineered to be both IT and OT friendly.  With features such as Firewall Assistant and Easy Protect mode, the mGuards are simple to configure securely while still providing unassailable protection for your critical assets. Relevant Ressources- DEF CON Groups | https://forum.defcon.org/social-groups- AWASP Foundation | https://owasp.org/- InfraGard | https://www.infragard.org/Recommended Materials- BEERISAC Podcast | https://podcasts.apple.com/us/podcast/beerisac-ot-ics-security-podcast-playlist/id1459741251- Industrial Cybersecurity: Efficiently secure critical infrastructure systems 1st Edition | https://amzn.to/3tv7Rcu- Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment, 2nd Edition | https://amzn.to/3hSxUFvConnect with UsClint Bodungen | https://www.linkedin.com/in/clintb/Vlad Romanov | https://www.linkedin.com/in/vladromanov/Dave Griffith | https://www.linkedin.com/in/davegriffith23/Manufacturing Hub | https://www.linkedin.com/company/manufacturing-hub-podcast/Let Us Know What You ThinkIf you enjoyed the show, it would mean the world to us if you could leave us a review: https://podcasts.apple.com/us/podcast/manufacturing-hub/id1546805573#manufacturing #automation #cybersecurity

    Clean
  • Cybersecurity Layoffs

    01/31/2023

    What's up, everyone?! In this episode, Ryan and Shannon discuss recent cybersecurity layoffs impacting some companies. Please LISTEN 🎧 LIKE 👍🏿 and SHARE ❤️  Thanks! Article: Dozens of Cybersecurity Companies Announced Layoffs in Past Year  https://www.securityweek.com/tens-of-cybersecurity-companies-announced-layoffs-in-past-year/?fbclid=IwAR3_8GU3EjgEcEEjt4PXnracW7Rpbr-nUK5vHRiSLEvdMuBIJz3kiGb0EAE#respond Socials:  Audio - https://anchor.fm/theothersideofthefirewall YouTube - https://www.youtube.com/channel/UCXZgdDvlcQ8bP_V4dEF02Yw Ryan on Twitter, LinkedIn, and Clubhouse - @ryrysecurityguy   #cybersecurity #corporate #layoffs --- Support this podcast: https://podcasters.spotify.com/pod/show/theothersideofthefirewall/support

    Clean
  • 3. John Bandler on Cybersecurity

    06/01/2018

    Attorney John Bandler wrote Cybersecurity for the Home and Office to help lawyers and in fact anyone take charge of their cybersecurity. The book provides a solid understanding of cybercrime, privacy threats, cybersecurity and computer technology. He speaks here with WallStreetNorth's John Metaxas as part of the series Podcasting for Lawyers.

    Clean
  • Understanding Cybersecurity

    10/20/2022

    Why it's important for parents to advice their children on the importance of cybersecurity

    Clean

Similar Podcasts

  • Depression Detox Show | Daily Inspirational Talks

    08/12/2020

    Malikee Josephs (Muh Leek - Jo Seffs)

    Get UNSTUCK. Be inspired by the best motivational, inspirational, and brain health experts to live a happier and more purposeful life! Join host Malikee Josephs Monday through Friday for your dose of motivation. If you’re struggling with feelings of unhappiness, loneliness, emptiness, anxiety, sadness, grief & loss, or not having a sense of purpose, this show is for YOU! ——————If you are in need of medical care, please consult with a therapist or physician.If you are in a crisis or thinking of harming yourself, please call the National Suicide Prevention Lifeline 1-800-273-8255. Calls are private and confidential. CDC Mental Health recommendation pagehttps://www.cdc.gov/mentalhealth/tools-resources/index.htm

    Clean

Episode Description

Often in the information security industry, professionals can be accused of spreading fear, uncertainty, and doubt with cybersecurity concerns. However, considering the implications of integrity attacks, it is essential to pay close attention to them. As more organizations move to cloud storage, user authentication compromises are increasing. If an organization has sensitive information that can be accessed from anywhere online by simply using a username and password, that information is at risk, and organizations should make an effort to make their networks more secure.  

In this podcast, LBMC Information Security’s Jason Riddle and Mark Fulford discuss the growing concerns with data integrity and how to avoid being a victim of attacks.  

Listen, and discover these key takeaways:

  • Feedback heard from the cybersecurity field
  • The need for two-factor or multi-factor authentication
  • The ability for integrity attacks to impact financial markets
  • How integrity attacks could be more effective than availability attacks and confidentiality attacks
  • The need to increase cybersecurity efforts to prevent integrity risks and attacks

Discussion (0)

Be respectful and constructive in your comments

No comments yet

Be the first to share your thoughts about this episode!