Cloud & Security: Under Lock and Key – Episode 2

Cloud & Security: Under Lock and Key – Episode 2

Cloud! She’s everywhere, ultra-efficient, and easily accessible – providing super storage for all your dynamic data needs. Security! He’s the marvelous muscle keeping info super safe and secure – able to lock up sensitive data with multi-factor authentication, encryption and key management. By themselves they are powerful forces, but can they work together to share

Guard against mobile security threats from iPhone vulnerabilities

Guard against mobile security threats from iPhone vulnerabilities

Hackers, they’re breaking into your phone in a variety of ways. They can use a phone’s RF communication capabilities like Wifi, Bluetooth, or Cellular to access, hack, or track your phone, even if it’s in airplane mode. Or through software such as Email, Text messages, Applications, browsing the internet or your operation system. Although your

Information Security Law and Your Career

Are you ready to IGNITE your information security career? Well then buckle up, put on your tin foil hat and get ready for HACKERS ON FIRE with your host, Glen Roberts. Glen: Hello everyone, this is Glen Roberts; I’m thrilled to introduce Ben Wright to Hackers on Fire. Hi, Ben. Ben: Hello. Glen: Ben Wright

How to keep your mobile safe with Sophos
Stealing Data Over Open WiFi

Stealing Data Over Open WiFi

>>Dude, there was a lot of great things about doing the show, Hacking the System. And we did that segment on the WiFi Pineapple, and the biggest bummer is that we went to such lengths to make sure that even if somebody went frame by frame, everything was accurate and correct.>>It was legitimate hacking code.>>Right?