Podcasts about it xd

  • 5PODCASTS
  • 27EPISODES
  • 41mAVG DURATION
  • ?INFREQUENT EPISODES
  • Oct 13, 2021LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about it xd

Latest podcast episodes about it xd

CERIAS Security Seminar Podcast
Jordan Mauriello, "Understanding Attackers and Motivations"

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 13, 2021


Understanding the evolution of attacker motivations, and the impact to managing risk in enterprise environments is a key to successfully building cyber security programs in today's IT enterprise. Over the last decade both attacks, and attacker motivations have evolved dramatically. From Hacktivism to Nation State Actors, from Identity Theft Rings to Ransomware-as-a-Service, the motivations, timing, determination, and discipline of attackers has changed dramatically. This presentation will discuss this evolution from early cyber espionage and hacktivism to evolving nation state threats and how motivations drive behavior and risk decision making in enterprise cyber security programs.

CERIAS Security Seminar Podcast
Gideon Rasmussen, "Adaptive Cybersecurity Risk Assessments"

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 1, 2021


This session provides practical cybersecurity assessment advice. It details the end-to-end process including: scoping, 9 steps to develop work papers, scheduling, on-site assessment, report preparation and presentation. The first assessment example leverages the NIST Cybersecurity Framework to ensure coverage across security domains. Sample scoping questions will be provided, along with tips and examples to add controls based on business processes, insider threat, privacy and fraud. This session also addresses follow-on assessments. Attendees are encouraged to evaluate lines of business and to take deep dives into critical functions. Tips and examples are provided to leverage best practices, creating specific testing procedures. Rather than repeating the same assessment year-over-year, the scoping methodology is risk opportunistic. There is focus on areas that have not been evaluated recently and areas that may require enhanced controls due to presence of valuable data. Albert Einstein's quote applies here “the definition of insanity is doing something over and over again and expecting different results”. The session will briefly walk through the assessment report framework, providing tips along the way. The assessment presentation phase includes a slide deck framework covering: the threat landscape, assessment methodology, high and moderate-high findings, a Strengths, Weaknesses, Opportunities and Threats (SWOT) slide and next steps.

RSO in 100 Sekunden
RSO in 100 Sekunden

RSO in 100 Sekunden

Play Episode Listen Later Aug 17, 2019 2:00


Heute mit folgenden Themen: Grenzüberschreitende Zusammenarbeit der Polizei GR und IT Jüdische Vermittler in Davos und Arosa unterwegs Die Bilanz der 100 Jahr-Feierlichkeiten der Lia Rumantscha

CERIAS Security Seminar Podcast
Haotian Deng, "CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference & Verification"

CERIAS Security Seminar Podcast

Play Episode Listen Later Jan 9, 2019


Caller ID spoofing forges the authentic caller identity, thus making the call appear to originate from another user. In this paper, we propose CEIVE (Callee-only inference and verification), an effective and practical defense against caller ID spoofing. It is a victim callee only solution without requiring additional infrastructure support or changes on telephony systems. We implement CEIVE on Android phones and test it with all top four US mobile carriers, one landline and two small carriers. It shows 100% accuracy in almost all tested spoofing scenarios except one special, targeted attack case.

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
065_6월 셋째주 뉴스_앞만보고 뒷모습까지 알아내는 AI

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Jun 17, 2018 43:58


메이저 하지 않은 변두리 IT 늬우스 / 앞만보고 뒷모습까지 알아내는 AI / 영화 불법 유통, 인공지능으로 원천봉쇄 / 애플, 1만2천명 전직원에 스탠딩 데스크 지급 / 구글, AI 기술 7대 원칙 발표 / 카를 짜이스, 삼양 렌즈를 디자인 카피로 고소 / 정부, 동영상 필터링 강화 / 네이버, 블로그 다시 키운다 / 이벤트 발표 * 페이스북 https://www.facebook.com/ITtrendcast/ * IT 관련 궁금증이나 지적질은 댓글, ITtrendcast@gmail.com 으로 부탁드립니다.

ai xd it xd
IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
061_6월 첫주 IT뉴스_인공지능을 활용해 눈가리고 아웅하는 네이버

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Jun 3, 2018 43:28


메이저 하지 않은 변두리 IT 늬우스 / 애플 2019년 전량 OLED 채택 / 몽블랑의 새로운 스마트 스트랩 / 3D프린터로 인공 각막 제작 / 애플이 ARM노트북 제작? / 네이버 뉴스 섹션 AI헤드라인 서비스 시범적용 / `양날의 검` 바이럴 효과 * 페이스북 https://www.facebook.com/ITtrendcast/ * IT 관련 궁금증이나 지적질은 댓글, ITtrendcast@gmail.com 으로 부탁드립니다.

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
053_5월 첫째주 늬우스_https 블록킹. 그 해결책은?

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later May 6, 2018 49:33


메이저 하지 않은 변두리 IT 늬우스 / 목줄없어도 안심, 반려견 원격 지시한다. / 이더리움 블록체인에 `판문점 선언` 새기다 / 한국형 AI의사 나온다. / 배틀그라운드 개발자들 대박 인센티브 / 전자책 편법할인 막는다. / https 블록킹 / 페이스북, 오픈소스 바둑 AI “오픈고” 공개 / 구글 .app 도메인 공개 / 화웨이가 독자 OS 개발중? / 닌텐도 스위치의 테그라 CPU의 칩 단계에서의 취약점이 발견 / G7 띵큐 출시 / AI가 만든 작품의 주인은 누구인가? / 미세플라스틱의 대안

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
045_4월 첫번째주 늬우스_한국에 특화된 랜섬웨어의 접근법!!

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Apr 1, 2018 54:43


메이저 하지 않은 변두리 IT 늬우스 / 테슬라 모델 X, 폭발 사고 / 8년 끈 세기의 자바 전쟁, 구글이 오라클에 패하다 / 몬데인, 새 하이브리드 스마트워치 Helvetica Regular 발표 / 中, 애플페이로 대중교통 요금 결제 / 네 개 대학 연구원들, 인텔 프로세서에서 다른 취약점 발견 / 이미지 저작권 빌미로 협박하며 랜섬웨어를 설치하는 피싱 메일 / 한국 해군, 프랑스 바라쿠다 급 핵잠수함 도입 검토중 / IBM 이 선정한 혁신 기술 5가지

ibm xd it xd
IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
040_3월 둘째주 늬우스_제대로 민폐인 러시아 산 핵추진 미사일

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Mar 11, 2018 44:54


메이저 하지 않은 변두리 IT 늬우스 / 아마존과 구글의 소심한 전쟁 / 블록체인 영상 플랫폼 `디튜브` / 테슬라 전기트럭 첫 배송 / 600m 산위에 만들어지는 `만년시계` / 러시아 핵추진 미사일 발표 / 플스5, 2020년 발표 루머 / 저가형 스마트폰 다수 트로이 목마 감염 / S9 슈퍼슬로 모션, AR 이모지 탑재 / 서아프리카 시에라리온 대선 블록체인 투표 * 페이스북 https://www.facebook.com/ITtrendcast/ * IT 관련 궁금증이나 지적질은 댓글, ITtrendcast@gmail.com

xd s9 it xd
IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
0361_2월 넷째주 늬우스_카카오T 택시와 카풀을 양손에...1/2

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Feb 25, 2018 31:33


메이저 하지 않은 변두리 IT 늬우스 / 카카오택시 올라탄 ‘럭시’ / 작금의 페이스북 / 평창올림픽에 싹트는 사랑 / PC용 텔레그램 취약점 이용 암호 화폐 채굴기 설치 / VLC 미디어 플레이어 3.0 발표 / 중국이 미국보다 앞서 레일건 함상 테스트를 할지도... / Kt 드래곤플라이 5G 스페셜포스2 VR / 닌텐도 스위치 해킹 그리고 당첨자 발표 * 페이스북 https://www.facebook.com/ITtrendcast/ * IT 관련 궁금증이나 지적질은 댓글, ITtrendcast@gmail.com 으로...

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
0361_2월 넷째주 늬우스_카카오T 택시와 카풀을 양손에...2/2

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Feb 25, 2018 31:01


메이저 하지 않은 변두리 IT 늬우스 / 카카오택시 올라탄 ‘럭시’ / 작금의 페이스북 / 평창올림픽에 싹트는 사랑 / PC용 텔레그램 취약점 이용 암호 화폐 채굴기 설치 / VLC 미디어 플레이어 3.0 발표 / 중국이 미국보다 앞서 레일건 함상 테스트를 할지도... / Kt 드래곤플라이 5G 스페셜포스2 VR / 닌텐도 스위치 해킹 그리고 당첨자 발표 * 페이스북 https://www.facebook.com/ITtrendcast/ * IT 관련 궁금증이나 지적질은 댓글, ITtrendcast@gmail.com 으로...

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
032_1월 첫주 늬우스_인텔과 MS의 버그패치 핑퐁

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Feb 4, 2018 65:43


메이저 하지 않은 변두리 IT 늬우스 / 위메프 “가상화폐로 물건 살 수 있게 추진” / 하이퍼루프… 최고 시속 386km 기록 / 일론 머스크, “세계에서 가장 안전한 화염 방사기 팝니다” / 범죄수익 가상화폐도 몰수! 항소심에서 몰수 판결. / 인텔과 MS의 멜트다운/스펙터 버그패치 / 안드로이드의 동영상 플레이어 MX 플레이어가 인도 Times Internet에 2억 달러에 인수 / 아마존 4분기 실적 605억달러 / 몬스터 헌터 월드 런칭 / 갤럭시 s9 루머

ms xd mx it xd
IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
026_1월 둘째주 늬우스_멜트다운, 스펙터 버그로 인텔 CPU 난리

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Jan 14, 2018 46:02


메이저 하지 않은 변두리 IT 늬우스 / 무인 물고기 드론 / 인텔 CPU, 멜트다운, 스펙터 버그로 난리 / AMD 1세대 라이젠 가격인하 발표 / 인텔, AMD GPU 통합 CPU 정식 발표 / 레진코믹스, 블랙리스트로 작가 관리 / 우버의 리플리 운영 / 가상화폐 소식 / CES2018 소식 * 페이스북 https://www.facebook.com/ITtrendcast/ * IT 관련 궁금증이나 지적질은 댓글, ITtrendcast@gmail.com 으로 부탁드립니다.

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담
022_12월 마지막 늬우스_애플 배터리 게이트에 대한 3인의 단상

IT trend_아이티에 관한 소소하지만 인사이트 있는 잡담

Play Episode Listen Later Dec 31, 2017 47:04


메이저 하지 않은 변두리 IT 늬우스 / 중국 `저장`대학교 그래핀을 이용한 슈퍼 배터리 개발 / 애플 배터리 게이트 / 소니, 웨어러블 손목시계줄 wena wrist 시리즈 신모델 출시 / 이더리움 네트워크를 사용한 최초의 블록체인 게임 `크립토 키티` / 국내 카이스트 연구진 나트륨을 이용한 이차전지 기술 개발 / 2018 CES 관전 포인트 / MacOS 버그는 현재 진행형 / 레일건 좌초 위기 / AMD, OpenGPU 발표 / 한국자동차산업협회가 2018년 자동차산업 성장율을 0%로 예상 내년에 뵙겠습니다. 감사합니다.

CERIAS Security Seminar Podcast
Kirsten Bay, "Securing the Future of Business: Broadening the Role of Security Technology"

CERIAS Security Seminar Podcast

Play Episode Listen Later Nov 29, 2017


Security technology has long been relegated as part of the IT stack, but the consistent stream of attacks on our government, corporations, and individuals alike have shown that the relationship between security technology and the business needs to be reconsidered. As we look at events such as manipulating news on Facebook, Equifax, WannaCry, NotPeta, and Uber, how do we engage a wider audience to be part of the conversation of understanding the challenges and solutions? What are the mechanisms that will stop companies from hiding the security gaps and events from investors, employees, and customers? This discussion will use current use cases intended to stimulate a dialogue on how we, as current and future leaders in cyber security, can better understand the broader risks and opportunities so that we can educate and inform on how to get ahead of the adversary.

Calvary Chapel of Crook County - main
Acts 11:19-30 "The Hand of God" - Audio

Calvary Chapel of Crook County - main

Play Episode Listen Later Oct 16, 2010 66:06


We've probably heard people mention the "Hand of God", but what does It really look like? What does It do? How does He use It? Pastor Rory Rodgers teaches on the "Hand of God" from Acts 11:19-30.

god acts acts 11 hand of god acts 11:19-30 it xd
CERIAS Security Seminar Podcast
Mihaela Vorvoreanu, Lorraine G. Kisselburgh, "Global Study of Web 2.0 Use in Organizations"

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 6, 2010


In this seminar, we present results from a global study about Web 2.0 use in organizations. The study, commissioned by McAfee, Inc., included a worldwide survey of over 1,000 organizational IT leaders, and in-depth interviews with industry experts. Data paint a rich picture of adoption and usage trends, as well as security concerns related to Web 2.0 technologies.

Christ the King Presbyterian (PCA): Vero Beach, FL
The Horns Of A Dilemma - Audio

Christ the King Presbyterian (PCA): Vero Beach, FL

Play Episode Listen Later May 9, 2010 37:04


Justisfication Why Do I Need It Where do I find It How Do I Get It

Christ the King Presbyterian (PCA): Vero Beach, FL
The Horns Of A Dilemma - Audio

Christ the King Presbyterian (PCA): Vero Beach, FL

Play Episode Listen Later May 8, 2010 37:04


Justisfication Why Do I Need It Where do I find It How Do I Get It

CERIAS Security Seminar Podcast
Juhee Kwon, "Information Security Management and IT Executives in a Top Management Team"

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 21, 2009


As information assets have become a critical factor for enterprises to stay competitive, there is an increasing awareness of information security management. However, they are easily overlooked by those who focus only on the IT side, failing to see that human resources and policies are the most likely cause of information risks, which need to become real enterprise-wide and strategic issues. This paper examines the impacts of an IT executive’s structural status in Top Management Teams (TMTs) on information security risk management. E-Business has made it imperative for IT executives to adopt cross-functional roles due to the increased importance of securing and managing risks to information assets across the enterprise. Therefore, IT executive representation and status in a TMT is necessary to strategically and operationally conduct liaison activities between IT groups and other business units. However, there is little empirical research examining the effects of IT executives’ structural status on managing information security risks. We employ logistical regression to examine the data from 2003 to 2008 with information security breach reports and executive compensation data. We augment this data with IT internal controls information provided by external auditors. Our results demonstrate high IT executive engagement and fair compensation are associated with reduced levels of both IT internal controls weaknesses and reported information security breaches. Second, we find that pay dispersion in a TMT increases the probability of information security breaches, while IT executive turnover is not significantly associated with breaches. As a comprehensive analysis across the accounting, human resources, and information systems literature, this study gives firms new insights into how they set IT executive compensation strategies as well as delegate authority and responsibility for ensuring confidentiality, integrity, and availability of information assets.

Christ the King Presbyterian (PCA): Vero Beach, FL

The Fundamental Problem - Sin, The Universality of It, The Pervasive Nature of It Getting Clear In My Head-What Does God Think of Me Chilling words - The Wrath of God Is Revealed....The Backdrop is the Good News - The Good News Becomes Intensely Good News When Applied To Ourselves The Wrath of God - What is it, Where is it revealed, How is it revealed, Why is it revealed God's wrath is not a temper tantrum, it is not unpredictable. It is God's Holy revulsion of His Being to all that is wrong

Christ the King Presbyterian (PCA): Vero Beach, FL

The Fundamental Problem - Sin, The Universality of It, The Pervasive Nature of It Getting Clear In My Head-What Does God Think of Me Chilling words - The Wrath of God Is Revealed....The Backdrop is the Good News - The Good News Becomes Intensely Good News When Applied To Ourselves The Wrath of God - What is it, Where is it revealed, How is it revealed, Why is it revealed God's wrath is not a temper tantrum, it is not unpredictable. It is God's Holy revulsion of His Being to all that is wrong

Christ the King Presbyterian (PCA): Vero Beach, FL

God Has Appointed A Time And It Will Come-Judgment of Babylon is Coming, Judgement for teh world is coming Look for It How To Live While Waiting What to Avoid

Christ the King Presbyterian (PCA): Vero Beach, FL

God Has Appointed A Time And It Will Come-Judgment of Babylon is Coming, Judgement for teh world is coming Look for It How To Live While Waiting What to Avoid

CERIAS Security Seminar Podcast
Gene Kim, " Prioritizing Processes and Controls for Effective and Measurable Security"

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 20, 2006


Are your security & IT controls really effective? Do you know how your security & IT operations compare to high performers? In this presentation, Gene Kim will share the work he has been doing over the last six years with the IT Process Institute (ITPI), Software Engineering Institute, and Institute of Internal Auditors, codifying the observed practices of high-performing IT organizations. These high performers have a culture of change management, a culture of causality and a perpetual desire to detect variance before it causes a catastrophic event. Specifically, Gene will discuss the ITPI IT Controls Benchmarking Survey of practice, a recently completed research project which has quantified the value, effectiveness, efficiency and security of controls. This landmark research has uncovered an alternative approach to being an effective security executive, based on measuring security by its ability to maintain its existing commitments; integrate controls into daily IT operations (prevent); put automated controls in place to variance before loss events (detect); reduce the percent of security incidents that result in loss events (detect); and successfully investigate and conclude security investigations. Attendees will learn about the key research findings: * That high performers have 5-8x higher operational and security effectiveness and efficiency measures * The 20% of IT controls that have 80% of the measurable benefits, and how to implement and the prescriptive steps to take in order to achieve defined security results * The certain processes and controls that have shown catalytic and sustaining properties, meaning that the value they add demonstrably exceeds the cost to implement, and report out on them.

CERIAS Security Seminar Podcast
David Carroll, "Identity Management Strategies and Integration Perspectives"

CERIAS Security Seminar Podcast

Play Episode Listen Later Apr 12, 2006


For large government agencies and corporations there can be significant value in the use of identity, access, and rights management infrastructures or IDM. The organizations investment in directory services, authorization services, rights management, and public key systems all combine to form a sometimes complex infrastructure. The products that are deployed may be based upon standards such as WS-Security, SAML, and X509.3 but many are still hampered by proprietary vendor implementation, lack of understanding of the capability of the technology as it relates to business process, or unwise architectural decisions. This seminar will focus on how the models for IDM are maturing and comment on how the urgency to deploy solutions changes when combined with service oriented architecture. The seminar will give practical examples from the experience of working within large scale infrastructures in both corporate and government environments. It will conclude with commentary on the IDM issues and solutions revolving around the largest government identity management effort to date

CERIAS Security Seminar Podcast
David Aucsmith, "Balancing Big Brother"

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 15, 1999


This talk addresses the issue of reconciling the needs of law enforcement and national security with the continuing evolution of computer and communications technology. It will describe the needs of both the law enforcement and national security communities including their current technical requirements and solutions. It will then describe technological trends and show how technical imperatives will render current solutions ineffective. It concludes with a description of possible directions that may be used to meet both law enforcement and national security needs while accounting for both technical evolution and social rights.