Look for any podcast host, guest or anyone
Showing episodes and shows of

TheCybersecurityInsider - Yigal Behar

Shows

The CybersecurityInsiderThe CybersecurityInsiderDell Data Breach! OMGToday we have discussed successful and unsuccessful breaches. Today's guest Seth Melendez. 1. Dell Customer Database Compromised 2. Library of Congress's MFA Fended Off October Breach 3. Some other smaller issues 4. Next topics... Stay tuned. Your host TheCybersecurityInsider 2024-05-1025 minThe CybersecurityInsiderThe CybersecurityInsiderCybersecurity Unscripted ConversationThe CybersecurityInsider is hosting two guests for a free and unscripted conversation about Cybersecurity. Tonight guests: Steve and Seth. We have discussed AI and how business should embrace it before it's too late for them. Why clients don't listen and fix their Cybersecurity issues. Is it money, time, expertise or something else? Assessments, GRC, and the new upcoming Microsoft Windows server 2025 with AI support too.  @TheCybersecurityInsider  Yigal Behar podcast@TheCybersecurityInsider.com   2024-03-2255 minThe CybersecurityInsiderThe CybersecurityInsiderThe Seven Cybersecurity Challanges For Year 2024Seven Cybersecurity challenges will continue to evolve and present new threats to individuals, businesses, and governments alike. Here are some of the major cybersecurity challenges expected in 2024. 1. Ransomware attacks have become increasingly common in recent years, with attackers using trusted tools to create tools that will encrypt organizations' data and demand a ransom in exchange for the decryption key. We can expect to see more targeted ransomware attacks, where attackers will seek out vulnerable organizations and demand larger ransoms. This means that organizations will need to invest in stronger backup and recovery mechanisms, as well as advanced...2024-03-2217 minThe CybersecurityInsiderThe CybersecurityInsiderFree Cybersecurity Talk With Seth and SteveThis time it's a free conversation with my friends Steve and Seth bringing some new thoughts to you. Ransomware Backup And Recovery NIST 800 and other subjects. Thanks for watching @TheCybersecurityInsider Host - Yigal Behar PodCast@TheCybersecurityInsider.com www.TheCybersecurityInsider.com 2023-04-111h 00The CybersecurityInsiderThe CybersecurityInsiderThe Cybersecurity Challenges For Year 2023Welcome to the thecybersecurity insider podcast. In today's episode, we'll be discussing the cybersecurity challenges that organizations are likely to face in 2023. From advanced persistent threats to artificial intelligence-based attacks, we'll be exploring the most pressing security risks that organizations need to be aware of. 1. Advanced Persistent Threats Artificial Intelligence and Machine Learning-Based Attacks 2. Internet of Things (IoT) Security 3. Cloud Security Ransomware 4. Conclusion: In conclusion, the cybersecurity challenges that organizations will face in 2023 are diverse and complex, with cyber threats continuing to evolve at an unprecedented pace. To protect...2023-04-1119 minThe CybersecurityInsiderThe CybersecurityInsiderLet’s Talk Backup & Restore - A Case StudyWelcome to this episode on backup and restore! In today's digital age, we rely heavily on technology to store and access our valuable data. Whether it's personal files, business documents, or creative content, losing this information can be a nightmare. That's where backup and restore come into play. By backing up our data, we ensure that it's stored in a safe location and can be retrieved in case of an unexpected event, such as a hardware failure or a cyber attack. In this podcast, we'll dive deeper into the importance of backup and restore, and...2023-04-1026 minThe CybersecurityInsiderThe CybersecurityInsiderCybersecurity News Flash For The Small Business Owner & IT ManagerHere are some news that you need to know as a network admin, business owner and anyone that security is important. * Microsoft to Block Messages From...On-Premises Exchange * QNAP OS Vulnerabilities Affect 80,000 Devices * WooCommerce Payments WordPress Plugin Authentication Bypass Vulnerability * Outlook App Vulnerability Thanks for watching! The CybersecurityInsider www.thecybersecurityinsider.com Host - Yigal Behar 2023-04-1011 minThe CybersecurityInsiderThe CybersecurityInsiderSee It In The Eyes - Ransomware Attack Case StudySeeing it on the news and stories from friends is one thing but when facing it for real is another one. Join me to this special case study and learn not to repeat mistakes. The Cybersecurityinsider Yigal Behar - Host podcast@thecybersecurityinsider.com www.2Secure.biz 2022-07-0134 minThe CybersecurityInsiderThe CybersecurityInsiderA Ransomware Case StudyAre you ready? do you have a plan to recover? What should you have in there?   The CybersecurityInsider Yigal Behar - Host podcast@thecybersecurityinsider.com   2022-04-1519 minThe CybersecurityInsiderThe CybersecurityInsiderThe CybersecurityInsider Ep 32: Globant Breach, Lapsus$, Linux Dirty Pipe, QNAP, OpenSSL, IE11The CybersecurityInsider Ep 32 Globant Breach by Lapsus$ 70gb and certificates were leaked. Linux Dirty Pipe effect QNAP OpenSSL effects QNAP and Palo Alto Networks Microsoft IE11 is being retired in June   The CybersecurityInsider Host - Yigal Behar PodCast@thecybersecurityinsider.com 2022-04-0811 minThe CybersecurityInsiderThe CybersecurityInsiderThe CybersecurityInsider Ep 31Chrome and Edge Sophos Firewall Okta Breach UPS Security Apple Fixes -Day Vul   Are you patching ? you better be! The CybersecurityInsider Yigal Behar - Host PodCast@TheCybersecurityInsider.com 2022-04-0118 minThe CybersecurityInsiderThe CybersecurityInsiderThe CybersecurityInsider Eps. 30Urgent Google Chrome and Microsoft Edge Security flow.   Here is a blog post: https://www.2secure.biz/2022/03/chrome-urgent-security-flow-update/ Thank you for listening The CybersecurityInsider Host _ Yigal Behar Questions? Yigal@TheCybersecurityInsider.com   2022-03-2806 minThe CybersecurityInsiderThe CybersecurityInsiderThe CybersecurityInsider Ep29The Russia / Ukraine War. Simple steps that two of customers took after listening/ watching Eps 27. Questions? The CybersecurityInsider Host - Yigal Behar yigal@thecybersecurityinsider.com 2022-03-2506 minThe CybersecurityInsiderThe CybersecurityInsiderTheCybersecurityInsider Ep 28 Russia Vs. Ukraine WarTheCybersecurityInsider Ep 28 Russia Vs. Ukraine War Talking about the upcoming threats due t this war and how the financial markets can influence the common man but also how that will effect cybersecurity spending, affecting security posture. #thecybersecurityinsider #2securecorp #yigalbehar #stevemagnani #cybersecurity #russia #ukraine #cyberthreats #ransomware   This time I'm hosting Steve Magnani. TheCybersecurityInsider Host: Yigal Behar 2Secure Corp www.2secure.biz   2022-02-2544 minThe CybersecurityInsiderThe CybersecurityInsiderTheCybersecurityInsider_Ep_27Talking about the war between Russia and Ukraine, the focus is Cybersecurity...   TheCybersecurityInsider Yigal Behar-Host 2Secure Corp www.2secure.biz  #2securecorp #thecybersecurityinsider #yigalbehar #cybersecurity #cyberwar #war #russia #Ukraine 2022-02-2511 minThe CybersecurityInsiderThe CybersecurityInsiderTheCybersecurityInsider Ep 26 Hosting JC Gillard @corixThis time we had JC Gillard @corix as our guest. How do you start a Cybersecurity? Cloud Supply Chain & MSP Digital Transformation - nothing new there... Use of shadowIIT Dropbox and more... The Cybersecurity Insider Yigal Behar - Host 2022-01-191h 04The CybersecurityInsiderThe CybersecurityInsiderTheCybersecurityInsider Ep 25 Cybersecurity IntelligenceThis time we had Karla Refolld talking about Cybersecurity Intelligence and why it's important to have it. Thanks Karla! TheCybersecurityInsider Host: Yigal Behar 2022-01-1228 minThe CybersecurityInsiderThe CybersecurityInsiderTheCybersecurityInsider Ep. 24This time we had Gordon Coyle our Cybersecurity insurance expert talking about ... secu err no Insurance policies for Cyber incidents. What to look for and how to shop for best policy. 2021-12-2258 minThe CybersecurityInsiderThe CybersecurityInsiderTheCybersecurityInsider Ep. 23Do you risk assessment, what is it? When? Talking about vulnerabilities and much more. 2021-12-2255 minThe CybersecurityInsiderThe CybersecurityInsiderThe Cybersecurity Insider - Ep 22. Supply Chain Attacks Are On The RiseWith Microsoft, SolarWinds and Now with Kaseya. Supply chain attacks are on the rise and companies should pay attention to 3rd parties having access to various systems.   This is a great challenge!   TheCyberSecurityInsider Yigal Behar podcast@TheCyberSecurityInsider.com   2021-07-0751 minThe CybersecurityInsiderThe CybersecurityInsiderTheCybersecurityInsider Ep 21 REvil Ransomware Steamship Ransomware Fujifilm MA Hospital RansomwareFBI Says REvil Ransomware Group Responsible for JBS Attack MA Steamship Authority Hit with Ransomware Attack Fujifilm Shuts Down Network in Wake of Ransomware Attack MA Hospital Discloses Ransomware Attack Update Available for WordPress Antispam Plugin And Seth's three low hanging fruit .. Yigal Behar TheCyberSecurityInsider podcast@TheCyberSecurityInsider.com 2021-06-1142 minThe CybersecurityInsiderThe CybersecurityInsiderThe Cybersecurity Insider - Ep. 20-Colonial Pipeline-VMware-Siloscape Malware-NYC-DoJ Yes RansomwareThe Cybersecurity Insider - Ep. 20-Colonial Pipeline-VMware-Siloscape Malware-NYC-DoJ Yes Ransomware.   Yigal Behar TheCyberSecurityInsider podcast@TheCyberSecurityInsider.com 2021-06-1033 minThe CybersecurityInsiderThe CybersecurityInsiderThe Cybersecurity Inside Special Episode: Ransomware ReadinessHow to prepare for a Ransomware or any Malware attacks? How to Improve your security posture and more. TheCybersecurityInsider 2Secure Corp Yigal Behar www.2secue.biz 2021-05-0333 min