Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts126/v4/e6/d9/3e/e6d93e5f-5932-e192-5bf1-c52b3d60f24d/mza_13871453960977882306.jpg/600x600bb.jpg
The Cyberalarm Podcast
SecureMe2 Cyber Security
10 episodes
5 days ago
Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity and will help you make the right decisions. Thanks for listening.
Show more...
Technology
RSS
All content for The Cyberalarm Podcast is the property of SecureMe2 Cyber Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity and will help you make the right decisions. Thanks for listening.
Show more...
Technology
Episodes (10/10)
The Cyberalarm Podcast
10 - Forgotten Equipment

In this episode, we will talk about the risks of abandoned IT systems. This element of forgotten ICT equipment is often overlooked. This encompasses devices that were once connected but are no longer actively managed because they have simply been overlooked. What appears as a harmless oversight can, however, bring unexpected risks.

Show more...
1 year ago
3 minutes 40 seconds

The Cyberalarm Podcast
9 - Cyber Threat Intelligence (CTI)

We are going to talk about CTI: Cyber Threat Intelligence. Our product Cyberalarm depends heavily on CTI to alert our customers when malicious traffic or behavior is detected. We use an enormous number of sources to collect data from all over the world to keep you as safe as possible. But what is this data called CTI?

Show more...
1 year ago
6 minutes 12 seconds

The Cyberalarm Podcast
8 - SPAN or Mirror ports

What are the span or mirror ports security companies often use to get data off a network?

Show more...
1 year ago
4 minutes 49 seconds

The Cyberalarm Podcast
7 - Multi Factor Authentication

What is MFA and why should you use it.

Show more...
1 year ago
3 minutes

The Cyberalarm Podcast
6 - GDPR and NIS-2

This time we will talk about European legislation. To be more precise. We will give you some context around the GDPR and the upcoming NIS-2 regulation. 

Show more...
1 year ago
5 minutes 14 seconds

The Cyberalarm Podcast
5 - SIEM and SOC
This is Julia, and I am going to talk about the difference between a SIEM and a SOC. Just like the episode about logging, monitoring and detection, we see many people, mostly management, talking about SIEM and SOC as if it is the same thing. Which it is not. They are two entirely different terms but are often used in a combination. So what is the difference?
Show more...
1 year ago
5 minutes 39 seconds

The Cyberalarm Podcast
4 - Logging, Monitoring and Detection

This podcast is going to talk about the difference between logging, monitoring, and detection. They're not just technical jargon; they're pillars of a secure and efficient IT environment. It's crucial for managers, especially those not steeped in IT knowledge, to understand these concepts.

Show more...
1 year ago
4 minutes 57 seconds

The Cyberalarm Podcast
3 - Vulnerability Management

This episode explains why vulnerability management should be a priority in your cybersecurity activities. Every patch and update you do minimizes the risk of an intrusion.

Show more...
1 year ago
3 minutes 24 seconds

The Cyberalarm Podcast
2 - Cyberalarm

What is Cyberalarm. A short introduction about the focus-product of SecureMe2. More info? Contact us via www.secureme2.eu

Show more...
1 year ago
4 minutes 20 seconds

The Cyberalarm Podcast
1 - The Cyberalarm Podcast - Intro

Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity. They can be on a high level about laws and regulations but also very technical about dialogues, flows, and packets on a network. Just pick and choose the topics that interest you.

Show more...
1 year ago
1 minute 14 seconds

The Cyberalarm Podcast
Welcome to the Cyberalarm Podcast. My name is Julia and I will guide you in the upcoming episodes through several topics which may be of interest to you. All the topics are closely related to cybersecurity and will help you make the right decisions. Thanks for listening.