Category: Cybersecurity
-
Data Privacy? Data Protection?
What’s the difference? I’m sure you have heard or used the terms data privacy and data protection. The two terms data privacy and data protection are often used interchangeably. However, there is an important difference between the two terms that you may not know or fully understand. To keep it…
-
CyberTalks Episode 2 – What is Secure Component Verification (SCV)?
Welcome to CyberTalks’ second podcast episode! Today, Adam Cook will be joining us to discuss Secure Component Verification (SCV). We’re excited to hear the answers to questions like, “What is secure component verification?,” “How does it work?,” and “What are the benefits of secure component verification?” Since Secure Component Verification…
-
Danger: Ransomware Attacks
If you have read some of my blogs before, you probably remember me talking about ransomware. If you haven’t, check out Data Protection Security PT. 3 – Cyber Attacks, I talked about the different types of cyber-attacks and talked briefly about ransomware. However, considering the number of ransomware attacks that…
-
CyberTalks Episode 1 – The White House Executive Order: Cybersecurity Initiative
Thank you for joining us on CyberTalks’ first episode. In the first episode, we will White House Executive Order Cybersecurity Initiative. We have Joann Kent joining us to talk about the initiative and we’ll ask her some question to get a better understanding of the executive order. Some topics we…
-
Welcome to CyberTalks
Welcome to the CyberTalks Podcast! Your host, Sevan Woods, and Co-Host ,Shakita DennisChain, wanted to take a minute to introduce ourselves and to say thank you for tuning in. We are excited to partner up and discuss what is happening in the cyber world. We promise to bring amazing and…
-
Server BMC Security Concerns – What They Don’t Know Can’t Hurt You
As anybody who has been a parent will tell you, children are voracious eaters (especially teenagers). Something my wife or I might buy as a component for a family dinner often becomes a single meal for one or more of our children as soon as it is discovered in the…
-
PowerProtect Cyber Recovery
What is Cyberspace? Cyberspace refers to the virtual computer world, more specifically, an electronic medium used to facilitate online communication. It typically involves a large computer network made up of many worldwide computer subnetworks that employ TCP/IP protocol to assist in communication and data exchange activities. The term cyberspace was…
-
Federated Security with VxRail
Philip and Cory from the GEOS team discuss software defined network security concepts in the context of multi-region NSX-T. They demo security groups, policy creation, micro-segmentation, and global policy enforcement in a multi-instance VCF on VxRail environment.
-
Data Protection Security PT. 3 – Cyber Attacks
Oh, great your back! Let’s continue with our data protection security series by talking about different types of cyber-attacks. What is a cyber-attack? A cyber-attack is when an organization or individual intentionally and maliciously attempt to breach the information system of another organization or individual. The main goal for somebody…
-
Kubernetes, Containers and Protection?
If you work in the technology industry in any shape, form, or fashion, you may have heard the term Kubernetes before. However, not everybody knows about Kubernetes. This is your lucky day, I will discuss what is Kubernetes, issues with protecting Kubernetes, and some solutions that are offered by Dell…
