Podcasts about data center security

  • 16PODCASTS
  • 46EPISODES
  • 30mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jul 16, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about data center security

Latest podcast episodes about data center security

Padepokan Budi Rahardjo
Keamanan Pusat Data (Data Center Security)

Padepokan Budi Rahardjo

Play Episode Listen Later Jul 16, 2024 17:20


Sedikit pengantar mengenai Pusat Data (Data Center). Sebetulnya ingin menjelaskan security-nya juga tapi sudah kepanjangan. Security (keamanan) akan dibahas pada video selanjutnya ya.

CarahCast: Podcasts on Technology in the Public Sector
Establishing Boundaries in Today's Data Centers with Juniper Networks and Dell Technologies

CarahCast: Podcasts on Technology in the Public Sector

Play Episode Listen Later Dec 8, 2023 40:36


Watch the Juniper Networks and Dell Technologies podcast to learn how your organization can meet Zero Trust requirements by establishing and managing user access to critical data centers and IT infrastructures. Learn about Juniper's Apstra solution to establish a holistic approach to Zero Trust networking.

Risk & Repeat
Risk & Repeat: Inside the 3CX supply chain attack

Risk & Repeat

Play Episode Listen Later Apr 4, 2023


This podcast episode discusses the 3CX supply chain attack, where it may have started, who was behind it and how the unified communications vendor has responded to the incident.

Risk & Repeat
Biden administration raises software liability questions

Risk & Repeat

Play Episode Listen Later Mar 7, 2023


This Risk & Repeat podcast episode discusses the White House's National Cybersecurity Strategy and its proposal to hold technology companies liable for insecure software.

Risk & Repeat
ESXiArgs ransomware campaign raises concerns, questions

Risk & Repeat

Play Episode Listen Later Feb 8, 2023


This Risk & Repeat podcast looks at the widespread ESXiArgs ransomware attacks and the questions they've raised about the threat landscape, vulnerability patching and more.

Risk & Repeat
Risk & Repeat: Breaking down Rackspace ransomware attack

Risk & Repeat

Play Episode Listen Later Dec 8, 2022


This Risk & Repeat podcast episode discusses the recent ransomware attack against cloud provider Rackspace, as well as the major service outage affecting its customers.

Agent of Influence
Episode 49 - Exploring Edge Data Center Security Challenges, Trends, and More - Todd Cushing

Agent of Influence

Play Episode Listen Later Nov 30, 2022 23:56


Exploring Edge Data Center Security Challenges, Trends, and MoreIn this episode of Agent of Influence, Nabil and Todd Cushing, President at 1623 Farnam, discuss the importance of edge data centers. Plus, they explore data center security challenges, third-party risk management, and advice for organizations migrating to edge data centers.  

NetEvents Podcasts
Network & Data Center Security

NetEvents Podcasts

Play Episode Listen Later Oct 29, 2021 61:38


Analyst Chair: Mauricio Sanchez, Research Director, Network Security & Data Center Appliance, SASE Market Research, Dell'Oro Group Panelists: Gail Coury, Senior Vice President and Chief Information Security Officer, F5 Networks. Jordan LaRose, Director of Consulting and Incident Response, F-Secure. Dr. Ronald Layton, Vice President, Converged Security Operations, Sallie Mae Bank. Vivek Bhandari, Sr. Director of … Continue reading Network & Data Center Security →

datacenterHawk
Cybersecurity in the Data Center Services Industry

datacenterHawk

Play Episode Listen Later Sep 22, 2021 19:55


Interested in Hyperscale data centers? Sign up for our free hyperscale data center course: https://lp.datacenterhawk.com/hyperscale-business-development-fundamentals Or get a quick 15 minute demo of our platform: https://lp.datacenterhawk.com/request-a-demo?utm_source=youtube&utm_medium=youtube&utm_campaign=demo ––––– Josh Bosquez CTO of Armor Cloud Security got to talk about the state of data center cybersecurity in a recent HawkTalk conducted by David Liggitt from datacenterHawk. This article is a general overview of the state of security in the industry, as well as the predictions that David and Josh talked about during the interview. Data Center Security in the Distant and Recent Past Josh is in a unique position to talk about cybersecurity for data centers. He cut his teeth in the Dallas telco industry in the late 1990s. Back then, the scene was all about the monitoring and empowering of data centers and creating new kinds of infrastructure automation. Later Josh and his team moved into the realm of compliance testing and automation. When the Cloud started to flourish, the focus became providing cybersecurity that could scale on demand. This is how he came to work with so many security oriented managed service providers (MSPs) in recent years. Josh noted that back in the old days, security planning and the protection of physical space like a data center was relatively easy. You could see the cables and the hardware, and you knew how everything stacked. But in the Cloud, things are abstracted. Everything is hands off. New techniques needed to be learned in this virtual terrain. As more and more companies moved to full or hybrid Cloud, the security strategy became far more complicated. Technician training and certification needed to be ramped up, and some companies needed to entirely rewrite their cybersecurity playbook. Data Center Security in 2021 Josh noted that as far as the most common things companies can do to protect themselves in 2021, there's no one silver bullet. But the most important thing is user education. If they don't know about ransomware, and phishing attempts, and what links are unsafe or unwise to click, about how IT support will actually contact them, and what questions they're allowed to ask... the user is a security liability. After education, the priorities are anti-virus, anti-spyware, and the like. But user education is number one in any case. With remote work becoming a top priority, trying to protect users at home is a big challenge in some companies. They had set up a safe environment in the office, and then suddenly everyone was a telecommuter. The protection they set up in the past has to rapidly shift in order to cover this new paradigm. He was asked to address what strategies companies providing data center services are using to protect themselves and their current customers. He said that these days, Armor standardizes around ways to gain full visibility into an environment. Every layer of the OSI model needs to be accounted for in some way, from physical data center access to network security, to access control, to hosts, and everything in between. To do this, a cybersecurity team needs to be able to see every asset out there, whether it's real or virtual. And the monitoring tools and reporting methods need to be understandable by experienced CISMs and relative laymen alike since you never know who you're going to need to explain a security situation to get buy-in for critical systems. A lot of organizations are leaning on security MSPs, simply because the budget for internal security has not changed over the years, while the complexity of the cybersecurity landscape has ramped up tremendously. So, they leverage the expertise of MSPs in the security compliance space even as they continue to build their own internal capabilities. Then they can use the monitoring, reporting, and automation tools that are provided by firms like Armor.

Chill Chill Security
EP416: Security Article - Google Data Center Security - 6 Layers Deep

Chill Chill Security

Play Episode Listen Later Sep 19, 2020 8:25


Sponsor by SEC Playground Music by https://www.bensound.com/ --- Support this podcast: https://anchor.fm/chillchillsecurity/support

Datacenter Technical Deep Dives
NSX-T Data Center Security and Distributed Firewall with Britton Johnson

Datacenter Technical Deep Dives

Play Episode Listen Later Apr 16, 2020 65:47


Britton Johnson (https://twitter.com/vcixnv) continues our series on NSX-T Data Center with a look at Security and Distributed Firewall. Britton dives deeper into the security features of the platform and shows us how security rules are evaluated. We also got a peek at vRealize Network Insight (vRNI) #NSX #VMware #Education Resources: https://www.vmware.com/resources/compatibility/search.php?deviceCategory=nsxt https://labs.hol.vmware.com/ HOL-2026-91-NET - VMware NSX-T Distributed Firewall Lightning Lab

Test and Release
Heed these core Scrum values to see measurable change

Test and Release

Play Episode Listen Later Feb 28, 2020


Why isn't Scrum paying off in faster software development and better user satisfaction with the product? Perhaps you adopted the framework without the values, says Ryan Ripley.

Test and Release
Heed these core Scrum values to see measurable change

Test and Release

Play Episode Listen Later Feb 27, 2020


Why isn't Scrum paying off in faster software development and better user satisfaction with the product? Perhaps you adopted the framework without the values, says Ryan Ripley.

Intel Chip Chat - Archive
Data Center Security Growth with Intel SGX – Intel Chip Chat – Episode 675

Intel Chip Chat - Archive

Play Episode Listen Later Nov 1, 2019


In this Intel Chip Chat audio podcast with Allyson Klein: In this episode of Intel Chip Chat, Jim Gordon, GM of Ecosystem Business Development, Strategy and Communication for Intel, joins us to talk about Intel’s next generation Intel Xeon E processors and Intel Software Guard Extensions (Intel SGX). Jim talks about how Intel delivers the […]

Inside the Datacenter - Connected Social Media
Data Center Security Growth with Intel SGX – Intel Chip Chat – Episode 675

Inside the Datacenter - Connected Social Media

Play Episode Listen Later Nov 1, 2019


In this Intel Chip Chat audio podcast with Allyson Klein: In this episode of Intel Chip Chat, Jim Gordon, GM of Ecosystem Business Development, Strategy and Communication for Intel, joins us to talk about Intel’s next generation Intel Xeon E processors and Intel Software Guard Extensions (Intel SGX). Jim talks about how Intel delivers the […]

Intel Chip Chat
Data Center Security Growth with Intel SGX - Intel® Chip Chat episode 675

Intel Chip Chat

Play Episode Listen Later Oct 31, 2019 10:09


In this episode of Intel Chip Chat, Jim Gordon, GM of Ecosystem Business Development, Strategy and Communication for Intel, joins us to talk about Intel’s next generation Intel® Xeon E processors and Intel® Software Guard Extensions (Intel® SGX). Jim talks about how Intel delivers the building blocks for security to CSPs, ISVs and other ecosystem partners that enable them to improve the security capabilities they offer to their customers, both in hardware and software. Intel now has general availability of the new Intel® Xeon E-2200 processors for server with double the Intel SGX enclave size – now 256MB. Take a listen to learn how this is leading to even more possibilities for new security use cases and developer innovation in HW based security. To learn more about developing solutions with Intel SGX, visit https://software.intel.com/sgx.

datacenterHawk
HAWKTALK 27 - JHOAN CHECO, SR VP OF DP FACILITIES, NORTHERN VIRGINIA & DATA CENTER SECURITY

datacenterHawk

Play Episode Listen Later Oct 9, 2019 21:47


In episode 27 of Hawktalk, Jhoan Checo sits down to discuss the Northern Virginia market and how DP Facilities has focused on security. ------ Thank you for watching this video. I am appreciative of your thoughts and comments - and thankful for the opportunity to serve the industry through datacenterHawk. ------ Learn more about the data center industry at www.datacenterhawk.com ------ Subscribe to our YouTube Channel at: https://www.youtube.com/c/datacenterHawk?sub_confirmation=1 ------ Follow us online here: Instagram: https://www.instagram.com/datacenterhawk_/ LinkedIN: https://www.linkedin.com/in/davidliggitt/ LinkedIN: https://www.linkedin.com/company/9488532/admin/ Twitter: https://twitter.com/d_liggitt Twitter: https://twitter.com/datacenterhawk Facebook: https://www.facebook.com/datacenterhawk/ SoundCloud: https://soundcloud.com/datacenterhawk #DP Facilities

Risk & Repeat
Risk & Repeat: NRCC breach stokes election security fears

Risk & Repeat

Play Episode Listen Later Dec 13, 2018


This week's Risk & Repeat podcast looks at the recently disclosed cyberattack on the National Republican Congressional Committee and the questions that remain about it.

Risk & Repeat
Risk & Repeat: NRCC breach stokes election security fears

Risk & Repeat

Play Episode Listen Later Dec 13, 2018


This week's Risk & Repeat podcast looks at the recently disclosed cyberattack on the National Republican Congressional Committee and the questions that remain about it.

Schooled in AI
IBM manager: Cyber-resilience strategy part of business continuity

Schooled in AI

Play Episode Listen Later Oct 31, 2018


Cyber resilience is increasingly a must for company executives. IBM's Andrea Sayles details the latest threats, as well as best practices for how to be prepared for attacks.

I Love Data Centers
Episode 030 - Mark Houpt - All Things Data and Data Center Security

I Love Data Centers

Play Episode Listen Later Oct 26, 2018 106:41


This week on the I Love Data Centers podcast: All Things Data and Data Center Security, I interview the Chief Information Security Officer of Databank, Mark Houpt. Whereas security has typically been an afterthought for most companies in the past, it has quickly become the most talked about topic in the industry these days with high profile data breaches happening on a regular basis. I wanted to do an interview that addressed the most common conversations data center and hosting providers are having with their clients so you can hear and understand the roles both parties have in protecting and securing corporate and client data. This conversation does just that and proved to be extremely enlightening. Truly, by listening to and digesting the content within this episode you will be well equipped to have this conversation, regardless of which side of the fence you sit on. Show Notes: 1:12 Interview starts 2:34 Mark’s credentials and certifications 7:09 Mark’s upbringing 9:28 How Mark got involved in tech 11:46 Mark’s Navy experience 16:40 Mark’s transition into tech 23:34 How does hacking and coding play together? 32:01 Precautionary steps companies can take to protect their data from hackers 37:43 Balancing between the corporate world and the data center world 47:28 What makes manage services different? 55:54 Other security traps that companies can fall into 59:58 What should companies that don’t need or can’t afford someone in a chief security officer role do? 1:04:05 What is a penetration test? 1:11:25 What is the B.A.A? 1:16:28 What about data centers that don’t need to be compliant to the B.A.A? 1:20:24 How to deal with the federal government agencies 1:23:17 Where does Data Banks responsibility start and stop with their clients? 1:28:59 Do our countries regulations put us in any danger? 1:41:36 What is something you’ve learned recently that blew your mind? 1:44:42 How to contact Mark Links mentioned: www.databank.com Contact Info: compliance@databank.com LinkedIn: https://www.linkedin.com/in/mark-houpt/

Risk & Repeat
Risk & Repeat: Facebook breach raises regulatory questions

Risk & Repeat

Play Episode Listen Later Oct 25, 2018


This week's Risk & Repeat podcast discusses new developments regarding Facebook's recent data breach, as well as the social networking giant's response to the incident.

Risk & Repeat
Risk & Repeat: Facebook breach raises regulatory questions

Risk & Repeat

Play Episode Listen Later Oct 25, 2018


This week's Risk & Repeat podcast discusses new developments regarding Facebook's recent data breach, as well as the social networking giant's response to the incident.

Risk & Repeat
Risk & Repeat: Business email compromise on the rise

Risk & Repeat

Play Episode Listen Later May 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the rise in business email compromise activity based on new data from the FBI's 2017 Internet Crime Report.

Risk & Repeat
Risk & Repeat: Business email compromise on the rise

Risk & Repeat

Play Episode Listen Later May 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the rise in business email compromise activity based on new data from the FBI's 2017 Internet Crime Report.

Risk & Repeat
Risk & Repeat: Breaking down the Verizon DBIR 2018

Risk & Repeat

Play Episode Listen Later Apr 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the '2018 Verizon Data Breach Investigations Report' and its findings about ransomware, phishing and more.

Risk & Repeat
Risk & Repeat: Breaking down the Verizon DBIR 2018

Risk & Repeat

Play Episode Listen Later Apr 17, 2018


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the '2018 Verizon Data Breach Investigations Report' and its findings about ransomware, phishing and more.

Risk & Repeat
Risk & Repeat: Uber data breach has implications for infosec

Risk & Repeat

Play Episode Listen Later Nov 30, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Uber data breach, which was concealed by company officials, and the ethics of data breach disclosure.

Risk & Repeat
Risk & Repeat: Uber data breach has implications for infosec

Risk & Repeat

Play Episode Listen Later Nov 30, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Uber data breach, which was concealed by company officials, and the ethics of data breach disclosure.

Risk & Repeat
Risk & Repeat: Why are Amazon S3 buckets spilling on the web?

Risk & Repeat

Play Episode Listen Later Jul 28, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.

Risk & Repeat
Risk & Repeat: Why are Amazon S3 buckets spilling on the web?

Risk & Repeat

Play Episode Listen Later Jul 28, 2017


In this week's Risk & Repeat podcast, SearchSecurity editors discuss the series of enterprise data leaks through misconfigured Amazon S3 buckets and what should be done about them.

Risk & Repeat
Risk & Repeat: Does the Amazon S3 outage raise security flags?

Risk & Repeat

Play Episode Listen Later Mar 9, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the recent Amazon Simple Storage Service outage and why the incident may have security implications.

Risk & Repeat
Risk & Repeat: Cloudflare bug poses incident response challenges

Risk & Repeat

Play Episode Listen Later Mar 3, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the recent Cloudflare bug that leaked an undetermined amount of customer data over several months.

Risk & Repeat
Risk & Repeat: Corero on DDoS defense in the IoT era

Risk & Repeat

Play Episode Listen Later Jan 6, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, Dave Larson of Corero Network Security discusses how DDoS defense has shifted to deal with IoT threats.

Risk & Repeat
Risk & Repeat: Corero on DDoS defense in the IoT era

Risk & Repeat

Play Episode Listen Later Jan 6, 2017


In this episode of SearchSecurity's Risk & Repeat podcast, Dave Larson of Corero Network Security discusses how DDoS defense has shifted to deal with IoT threats.

Risk & Repeat
Risk & Repeat: Yahoo data breach details emerge

Risk & Repeat

Play Episode Listen Later Nov 16, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss new information on the Yahoo data breach, including how counterfeit cookies may have been used by attackers.

Risk & Repeat
Risk & Repeat: Yahoo data breach details emerge

Risk & Repeat

Play Episode Listen Later Nov 16, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss new information on the Yahoo data breach, including how counterfeit cookies may have been used by attackers.

Risk & Repeat
Risk & Repeat: How bad is the httpoxy vulnerability?

Risk & Repeat

Play Episode Listen Later Jul 28, 2016


In this Risk & Repeat podcast, SearchSecurity editors analyze the httpoxy vulnerability and discuss why it took so long to uncover and address a 15-year-old security flaw.

Risk & Repeat
Risk & Repeat: How bad is the httpoxy vulnerability?

Risk & Repeat

Play Episode Listen Later Jul 28, 2016


In this Risk & Repeat podcast, SearchSecurity editors analyze the httpoxy vulnerability and discuss why it took so long to uncover and address a 15-year-old security flaw.

Risk & Repeat
Risk & Repeat: Can the Symantec-Blue Coat deal succeed?

Risk & Repeat

Play Episode Listen Later Jun 24, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss Symantec's big move to acquire Blue Coat Systems and what it means for both security vendors.

Risk & Repeat
Risk & Repeat: Can the Symantec-Blue Coat deal succeed?

Risk & Repeat

Play Episode Listen Later Jun 24, 2016


In this Risk & Repeat podcast, SearchSecurity editors discuss Symantec's big move to acquire Blue Coat Systems and what it means for both security vendors.

ITS Partner's Video Podcast
Data Center Security 6: Configuring Application Whitelisting, Data Center Security & Managed Services

ITS Partner's Video Podcast

Play Episode Listen Later Jul 8, 2015 9:26


Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications.   Learn more at www.itsdelivers.com

ITS Partner's Video Podcast
Symantec Data Center Security: Keeping Legacy OS Protected

ITS Partner's Video Podcast

Play Episode Listen Later Jun 1, 2015 34:36


Are you unsure about the protection on your critical systems? Unable to migrate away from old, vulnerable, non-supported operating systems? Dependent on aging hardware to support sensitive production lines? Interested in performing agent-less malware scanning on your stack of virtual servers? If any of these are true, you’ve found the right video! The health and security of your data centers is vital to your organization. Today’s security must support rapid provisioning and interactions of business applications across dynamic infrastructures, and we’re going to show you how Data Center Security accommodates diverse use cases that provide the security for your infrastructure. Topics we will cover include use cases from various industries: Finance: Protecting customer information and security intelligent alerting/auditing Manufacturing: Secure applications and business operations Retail: Securing consumer end devices   Health care: Patching legacy systems and protecting systems with consumer data Everybody: Behold the efficiency and convenience of agent-less VMware malware scanning in DCS:Server Advanced

Intel Chip Chat
Increased Data Center Security, Efficiency and Reliability with IBM – Intel® Chip Chat episode 342

Intel Chip Chat

Play Episode Listen Later Sep 5, 2014 10:28


Brian Connors, the VP of Global Product Development and Lab Services at IBM, stops by to talk about the launch of the company’s new M5 line of towers, racks and NeXtScale systems based on the Intel® Xeon® processor E5 v3. The systems have been designed for increased security (Trusted Platform Assurance and Enterprise Data Protection), efficiency and reliability and offer dramatic performance improvements over previous generations. For more information, visit www.ibm.com.

data chip ibm chat intel efficiency increased reliability data centers processor m5 microprocessor intel xeon global product development data center security intel chip chat brian connors
The Security Podcasts
Virtualization and Data Center Security: What You Need to Know for 2014

The Security Podcasts

Play Episode Listen Later Oct 21, 2013 10:00


data centers virtualization data center security
The Security Podcasts
Virtualization and Data Center Security: What You Need to Know for 2014

The Security Podcasts

Play Episode Listen Later Oct 21, 2013 10:00


Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint. However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks?