Archive for the CISM Category

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

[podcast] WMI, WBEM, and enterprise asset management

WMI (Windows Management Instrumentation) has been a part of the Windows Operating system since Windows 95. With it, you can make queries about information on hosts, locally and even remotely. Why are we talking about it? Its use in the enterprise and by admins is rarely used,

Read more

[podcast] Cryptonite – or how to not have your apps turn to crap

This week, we find ourselves understanding the #Cryptonite that can weaken devs and software creators when dealing with #cryptographic #algorithms and #passwords. Lack of proper crypto controls and hardcoded passwords can quickly turn your app into crap. Remember the last time you heard about a hardcoded #SSH

Read more

Hector Monsegur, on being a reformed “Black Hat”

Hector Monsegur, on being a reformed “Black Hat”

Hector Monsegur has had a colorful history. A reformed black hat who went by the name ‘Sabu’ when he was involved in the hacker collectives “Lulzsec” and “Anonymous”, he turned state’s evidence for the FBI, working to stop further hacking attempts by the same people he was

Read more

[podcast] Michael Gough, the ISSM model, and the 5 P’s

[podcast] Michael Gough, the ISSM model, and the 5 P’s

Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-013-michael_gough-the_5_Ps.mp3 iTunes: https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id799131292?mt=2 (look for the episode starting with “2016-013”) We discuss a model that Michael Gough used while he was at HP. The Information Security and Service Management (ISSM) Reference model can be used to help companies align their IS and IT goals with

Read more

[podcast] Software Restriction Policies and Applocker

[podcast] Software Restriction Policies and Applocker

Windows has all the tools you need to secure an OS, but we rarely use them.  One example of this is ‘Software restriction policies’ or the use of Windows Applocker. It assists IT organizations by allowing you to block certain files from being saved anywhere, what file

Read more

[podcast] Carbon Black’s Ben Johnson: EDR and threat intel

[podcast]  Carbon Black’s Ben Johnson: EDR and threat intel

  Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client’s endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security strategist for Carbon Black. In that role, he uses

Read more

[podcast] Kim Green, on CISO-aaS, the Redskins Laptop, and HIPAA

  We are pleased to introduce Ms. Kim Green (Twitter: @kim1green). She is the CEO of KAZO Security, as well as the CISO / CPO of Zephyr Health, a #SaaS based #Healthcare data #analytics company.  She brings over 20 years of experience in healthcare and leadership to

Read more

Top In-Demand Cyber Security Certifications

Top In-Demand Cyber Security Certifications

When it comes to IT certifications most would agree that the “Big-3” essentials are CompTIA A+, CompTIA Network+, and CompTIA Security+. From there, a few specialized certs along the lines of Cisco CCNA, Linux and Microsoft certifications as well as a few other vendor and technology-specific certifications,

Read more

[#podcast] Aamir Lakhani discusses the DarkWeb…is all the content on the Darkweb bad? And becoming a known quantity on the DarkWeb…

[#podcast] Aamir Lakhani discusses the DarkWeb…is all the content on the Darkweb bad? And becoming a known quantity on the DarkWeb…

  Mr. Boettcher and I met Mr. Aamir #Lakhani at DerbyCon this year, and immediately intrigued with his work on the Dark Web. He has assisted with law enforcement investigations, a known member of the dark web, to the point where people with #malware or bots will

Read more

[#podcast] Ben Johnson on company culture shifts, needing better job descriptions, assisting your company’s “cyber self-esteem”

http://traffic.libsyn.com/brakeingsecurity/2016-041-Ben_johnson.mp3     Ben Johnson from Carbon Black has been around the industry for a good while, and has seen a lot of ugly things in our industry. Ben had written a recent blog post (https://www.carbonblack.com/2016/08/12/benvlog-3-negative-forces-driving-security/) detailing the issues that seem to plague many companies and many

Read more
Page 1 of 212

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel