Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/83/01/0d/83010d06-096a-9281-d806-69d503227a43/mza_12837184525763599952.jpeg/600x600bb.jpg
The Core Podcast
Core To Cloud
76 episodes
3 months ago
Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Technology
RSS
All content for The Core Podcast is the property of Core To Cloud and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Technology
https://assets.pippa.io/shows/6322e89b85cb8e0011f0d773/1709640462606-9fd6c7311c5e308fe33b3554db070839.jpeg
Avoid Getting Hacked: Lessons from NASA's 1999 Cyber Attack
The Core Podcast
51 minutes 16 seconds
1 year ago
Avoid Getting Hacked: Lessons from NASA's 1999 Cyber Attack

Summary


In this conversation, Kelly Allen interviews Andy Schneider about the illusion of security preparedness. They discuss Andy's background in cybersecurity, the NASA cyber attack in 1999, the importance of cloud security posture, and best practices for enhancing security in the cloud. They also touch on the talent shortage in the cybersecurity industry and the need for continuous detection capabilities. Andy shares the story of the NotPetya cyber attack as an example of the impact of cybersecurity on geopolitical events. The conversation covers various topics related to cybersecurity, including the impact of cyber attacks, the evolving nature of cybersecurity, the importance of human connection, and the role of technology in defense. The guest, Andy Schneider, emphasizes the need for continuous learning in the cybersecurity field and highlights the different career opportunities available. He also provides recommendations for building a comprehensive cybersecurity tool stack and selecting the right technology partner.


Chapters


00:00: The Evolution of Cyber Warfare: From 1999 to the Present

03:56: Unveiling the Illusion of Security Preparedness: A Cybersecurity Journey

09:41: The Role of Cloud Security Posture Management in Cyber Defense

36:08: Human Connection and Trust in Cybersecurity

50:02: Continuous Learning and Adaptation in the Cybersecurity Industry


Takeaways


  • The evolution of cyber warfare has led to a shift in the nature of cyber attacks and the actors involved.
  • The NASA cyber attack of 1999 serves as a relevant case study highlighting the impact of cyber attacks and the vulnerabilities of digital infrastructure.
  • Cloud security posture management (CSPM) is a crucial aspect of cybersecurity, but it is not the only defense mechanism needed to protect against cyber threats.
  • The cybersecurity industry faces a talent shortage, and there is a need for upskilling and adapting to the evolving landscape.
  • Human connection and trust play a significant role in cybersecurity, and the industry requires continuous learning and adaptation to stay ahead of cyber threats.

 

Keywords

security preparedness, cybersecurity, illusion, NASA cyber attack, cloud security posture, talent shortage, detection capabilities, NotPetya cyber attack, cybersecurity, cyber attacks, evolving nature, human connection, technology, defense, continuous learning, career opportunities, tool stack, technology partner


Hosted on Acast. See acast.com/privacy for more information.

The Core Podcast
Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.

Hosted on Acast. See acast.com/privacy for more information.