POPULARITY
Get ready for Earth's Mightiest Holidays in 2026 and 2027! Let's break down the delays to Avengers: Doomsday and Avengers: Secret Wars, as there is much to unpack. Waiting seven more months for each of the next two Avengers movies may not sound like fun, but if a little more time allows the films to be the best versions of themselves, it will truly be a Merry Multiverse Saga for us all. Hosted by Sean Gerber. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Send us a textSecurity regulations are changing dramatically in response to major breaches, and the implications for cybersecurity professionals are profound. Sean Gerber kicks off this episode with a career announcement, sharing his transition to independent consulting after 13 years with his previous employer—a move that highlights the evolving opportunities in the cybersecurity field.The heart of this episode examines the recent UnitedHealthcare breach, where attackers targeted Change Healthcare, a critical system processing 15 billion healthcare transactions annually. The February ransomware attack led to a $22 million ransom payment and disrupted approximately half of all pharmacy operations across the United States. This incident serves as a perfect case study in critical infrastructure vulnerability and has triggered a significant regulatory response from the Biden administration, which is now promising "tough, mandatory cybersecurity standards" for the healthcare industry.What does this mean for security professionals? Potentially stricter oversight, increased financial penalties, and perhaps most concerning—explicit executive liability for security failures. As Sean notes, these developments create an increasingly complex landscape where CISOs must navigate not just technical challenges but also regulatory expectations that might lack technical nuance.The episode transitions into a comprehensive examination of CISSP exam questions covering Domain 3.6, focusing on message integrity, digital signatures, and cryptographic hashing functions. Through fifteen detailed questions and answers, Sean breaks down essential concepts like the difference between checksums and hashing functions, the evolution from SHA-1 to more secure algorithms, and the role of certificate authorities in public key infrastructure. These technical foundations aren't just academic—they're the building blocks of systems that, when implemented correctly, prevent exactly the kind of breach that hit UnitedHealthcare.Ready to deepen your understanding of message integrity and prepare for the CISSP exam? Visit CISSP Cyber Training for videos, transcripts, and additional practice questions to help you master these critical concepts and advance your cybersecurity career.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Join us as we discuss Thunderbolts*, a very special and emotionally impactful film that breaks new ground for the MCU. Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Send us a textThe rapid evolution of artificial intelligence and machine learning has created a pivotal moment for financial institutions. As these organizations race to implement AI solutions, they face both transformative opportunities and significant cybersecurity challenges that demand immediate attention.Sean Gerber draws from over 20 years of cybersecurity experience to demystify the complex intersection of AI, machine learning, and financial security. With his straightforward approach, Sean breaks down the fundamental differences between AI (the broader field) and ML (the subset that enables systems to learn from data without explicit programming), making these concepts accessible even to those without technical backgrounds.The central message resonates clearly throughout: AI must be developed and employed with a secure design approach from day one. Financial institutions that implement security as an afterthought rather than a foundation will inevitably face costly remediation down the road. Sean outlines practical security considerations including data anonymization, network segmentation, intellectual property protection, and AI-specific policies that organizations should implement immediately.Through real-world examples from JP Morgan, Bank of America, and Capital One, we see how leading financial institutions are already leveraging AI for legal contract reviews, fraud detection, customer engagement, and risk assessment—all while implementing varying degrees of security controls to protect their systems and data.Looking toward the future, Sean previews emerging trends including generative AI for threat analysis, federated learning approaches, and quantum-aware AI security that will reshape financial cybersecurity within the next five years. His practical action items emphasize building multidisciplinary teams spanning AI, cybersecurity, legal and business domains to ensure comprehensive implementation.Whether you're a CISO at a major bank or a security professional preparing for emerging challenges, this episode provides the strategic framework needed to navigate AI implementation securely. The message is clear: investing time and resources in proper security foundations now will determine whether AI becomes your competitive advantage or your greatest vulnerability.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Send us a textCybersecurity isn't just for enterprises—small and medium businesses face increasingly sophisticated threats with fewer resources to combat them. In this information-packed episode, Sean Gerber explores why cybersecurity matters critically for SMBs while delivering practical CISSP exam questions focused on Domain 8.3.Sean begins by examining how even non-tech businesses rely heavily on digital systems, making them vulnerable to attacks that could devastate operations. A ransomware incident targeting inventory management or employee scheduling could cripple a small business just as effectively as one targeting a financial institution. Business continuity planning—often overlooked until disaster strikes—becomes a critical safeguard that many small businesses simply don't consider until it's too late.The economic reality of cybersecurity for small businesses creates a challenging landscape. While virtual CISO services and managed security operations centers offer potential solutions, many remain financially out of reach for smaller organizations. This creates a significant vulnerability gap in our business ecosystem that security professionals must work to address.The episode then transitions into fifteen carefully crafted CISSP practice questions focusing on Domain 8.3, covering essential concepts like API security, content security policies, message queue poisoning, and the principle of least privilege in containerized environments. Each question explores real-world vulnerabilities while providing clear explanations about proper security approaches.Whether you're studying for the CISSP exam or working to improve your organization's security posture, this episode delivers actionable insights on identifying and mitigating common application security vulnerabilities. Subscribe to the CISSP Cyber Training podcast for weekly deep dives into cybersecurity concepts that will help you pass your certification exam and become a more effective security professional.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Join us as we break down the emergence of Mayor Kingpin in S1:E8 of Daredevil: Born Again! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Send us a textWondering how to tackle incident response questions on the CISSP exam? This episode delivers exactly what you need, walking through fifteen essential incident management scenarios that test your understanding of this critical domain.Sean Gerber breaks down the fundamentals of incident management, exploring how security professionals should approach detection, response, mitigation, and recovery. From distinguishing between legitimate security incidents and routine activities to prioritizing response efforts based on severity, each question targets a specific aspect of incident management that CISSP candidates must master.The questions systematically cover the incident response lifecycle, highlighting the importance of proper processes rather than blame-focused reactions. You'll learn why activating the incident response team should be your immediate priority upon detection, how to effectively categorize and prioritize incidents, and what constitutes valid mitigation strategies versus ineffective approaches. The episode also emphasizes the documentation requirements for incident reports and the value of capturing lessons learned for continuous improvement.What makes this episode particularly valuable is how it reinforces the CISSP mindset—understanding not just the technical aspects but the thought processes behind effective security management. Whether you're preparing for certification or looking to strengthen your practical knowledge of incident response, these question scenarios provide the framework you need to approach real-world security events with confidence. Check out the special offer at CISSPCyberTraining.com to continue your certification journey with expert guidance.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Send us a textCybersecurity incidents aren't a matter of if, but when. Are you prepared to respond effectively? Sean Gerber takes us through the complete incident response lifecycle, breaking down the seven essential phases every security professional must master. From developing comprehensive response plans to conducting effective post-incident analysis, this episode provides actionable guidance for both CISSP candidates and working cybersecurity practitioners.The stakes couldn't be higher for small and medium-sized businesses, with a staggering 43% of cyber attacks specifically targeting SMBs. Most lack adequate protection due to limited budgets and resources. Sean explores practical solutions including leveraging AI tools to develop baseline response plans, implementing critical security controls like multi-factor authentication, and establishing clear communication protocols for when incidents occur.What sets this episode apart is Sean's emphasis on the human element of security. "Every employee is a sensor," he reminds us, highlighting how proper training and awareness can transform your workforce into your first line of defense. He balances technical recommendations with strategic insights, including how to approach different types of incidents from ransomware to insider threats.Whether you're preparing for the CISSP exam or strengthening your organization's security posture, this episode delivers the perfect blend of theoretical knowledge and real-world application. The incident response process outlined here will not only help you pass certification exams but could mean the difference between a minor security event and a catastrophic breach.Ready to transform how you prepare for and respond to cybersecurity incidents? Listen now and discover why having a tested, comprehensive incident response plan is your best defense against the inevitable attack.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Join us as we break down Daredevil and Mayor Fisk's race to stop Muse in S1:E7 of Daredevil: Born Again! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Join us as we break down the return of Daredevil (and Kingpin) and so much more in this spoiler review of S1:E6 of Daredevil: Born Again! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Send us a textDigital signatures are coming to AI models as cybersecurity evolves to meet emerging threats. Google's collaboration with NVIDIA and HiddenLayer demonstrates how traditional security controls must adapt to protect machine learning systems vulnerable to new forms of tampering and exploitation. This essential evolution mirrors the broader need for robust security validation across all systems.Security control testing forms the foundation of effective cybersecurity governance. Without proper validation, organizations operate on blind faith that their protections actually work. In this deep dive into Domain 6.2 of the CISSP, Sean Gerber breaks down the critical differences between assessments, testing, and audits while exploring practical approaches to vulnerability scanning, penetration testing, and log analysis.Vulnerability assessments serve as your first line of defense by systematically identifying weaknesses across networks, hosts, applications, and wireless infrastructure. The Common Vulnerability Scoring System helps prioritize remediation efforts, but understanding your architecture remains crucial - a low-scoring vulnerability in a critical system might pose more risk than a high-scoring one in an isolated environment. Meanwhile, penetration testing takes validation further by simulating real-world attacks through carefully structured phases from reconnaissance to exploitation.As organizations increasingly embrace APIs, ML models, and complex software architectures, security testing must evolve beyond traditional boundaries. Code reviews, interface testing, and compliance checks ensure that security is built into systems from the ground up rather than bolted on afterward. The shift toward "security left" integration aims to catch vulnerabilities earlier in the development lifecycle, reducing both costs and risks.Ready to master security control testing and prepare for your CISSP certification? Visit CISSPCyberTraining.com to access comprehensive study materials and a step-by-step blueprint designed to help you understand not just the exam content, but the practical application of cybersecurity principles in real-world scenarios.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Join us as we celebrate the team-up we didn't know we needed, Matt Murdock and Yusuf Khan, in this spoiler review of S1:E5 of Daredevil: Born Again! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Send us a textCybersecurity professionals, alert! A dangerous Chrome zero-day vulnerability demands your immediate attention. In this action-packed episode, Sean Gerber breaks down CVE-25-2783, a critical security threat that allows attackers to execute remote code simply by having users click malicious links. Though initially targeting Russian organizations, this exploit threatens Chromium-based browsers worldwide—including Chrome, Edge, Brave, Opera, and Vivaldi. Don't wait—patch immediately!The heart of this episode delivers 15 expertly-crafted CISSP practice questions focusing on Domain 4.2 network security concepts. Sean methodically explores essential topics including router load balancing capabilities, electromagnetic interference vulnerabilities, NAC implementation benefits, and optimal firewall configurations. Each question peels back another layer of network security knowledge, from identifying mesh topologies as offering superior fault tolerance to understanding how protocol analyzers diagnose VLAN performance issues.Advanced concepts receive equal attention with clear explanations of UDP timeout values in stateful firewalls, proper NIPS deployment strategies, VPN protocol security comparisons, broadcast storm mitigation techniques, and wireless security standards. Sean's straightforward breakdown of why WPA3 Enterprise provides superior protection and how ARP poisoning facilitates man-in-the-middle attacks transforms complex technical material into accessible knowledge that sticks.Whether you're actively studying for the CISSP exam or simply looking to strengthen your network security fundamentals, this episode delivers precision-targeted information in an engaging format. Visit CISSP Cyber Training for complete access to all practice questions covered and accelerate your certification journey today!Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Join us as we break down the reunion of Matt Murdock and Frank Castle, and so much more in this spoiler review of S1:E4 of Daredevil: Born Again! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Join us as we break down the trial of Hector Ayala in this spoiler review of S1:E3 of Daredevil: Born Again! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Send us a textToday's cybersecurity landscape demands vigilance on multiple fronts, something Sean Gerber demonstrates masterfully in this information-packed episode focused on CISSP Domain 3 security principles.The episode opens with a critical security alert regarding Cox modems—a vulnerability potentially affecting millions of American households and businesses. While quickly patched by the company, this real-world example perfectly illustrates one of Gerber's key points: exposed APIs represent a massive blind spot in organizational security posture. "Many organizations truly do not understand how many API connections they have leaving their organization," Gerber warns, identifying this as a primary vector for data exfiltration.Moving into the heart of the episode, Gerber walks listeners through fifteen challenging CISSP exam questions covering encryption standards, security principles, and practical implementation scenarios. Each question reveals essential security concepts—from why AES-256 should be prioritized over proprietary encryption algorithms to how abstraction and access controls function together in database security. The explanations break down complex topics into digestible, exam-ready knowledge while providing practical context for real-world application.Perhaps most valuable is Gerber's focus on security principles working in concert rather than isolation. Defense-in-depth, secure defaults, data hiding, and integrity verification through hashing are explained through scenarios security professionals encounter daily. Whether you're preparing for the CISSP exam or looking to strengthen your organization's security posture, this episode delivers actionable insights and critical thinking frameworks to elevate your cybersecurity approach. Visit cissp cyber training.com to access these questions and additional resources that will help you pass the CISSP exam on your first attempt.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Join us as we break down the first two episodes of Daredevil: Born Again! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Captain America: Brave New World may not have lived up to everyone's expectations (we liked it), but there are reasons to believe that Marvel Studios will still be able to call 2025 a major success. We explain why Thunderbolts* and The Fantastic Four: First Steps will likely be better (and received better) than the MCU's first theatrical installment of the year. Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Andy is joined by Sean Gerber to look back at and review season 1 of Creature Commandos. They also discuss the director, budget, and rumors of the upcoming Clayface film. Find more Holy BatCast on the internet: Web | Twitter | Facebook | Instagram | YouTube | Patreon Rate, review, & subscribe to Holy BatCast on: Apple Podcasts | Spotify | Google Play | iHeartRadio | Stitcher | TuneIn Your feedback is appreciated. Send emails to holybatcast@rf4rm.com Save up to 48% on Magic Mind at MagicMind.com/Holy20.
Send us a textUncover the secrets to mastering firewalls and advancing your cybersecurity career with insights from the CISSP Cyber Training Podcast. Ever wondered how a simple firewall can be your strongest ally against a $12 billion threat that financial firms have faced over the past two decades? Join me, Sean Gerber, as we navigate the indispensable role of firewalls within cybersecurity, especially for those gearing up for the CISSP exam. This episode promises an enriched understanding of firewalls, from regulatory compliance to integrating next-generation firewalls in cloud environments like Azure and AWS.The discussion extends beyond technicalities, emphasizing the importance of understanding the entire security chain for effective implementation and maintenance of firewalls. By exploring real-world scenarios, such as the implementation of government-mandated firewalls in Sri Lanka, we highlight how robust logging systems and regulatory compliance are vital in shaping a secure network architecture. The complexities of handling advanced intrusion attempts with next-generation firewalls are unraveled, showcasing their application-layer protection and their importance in achieving a resilient security posture.Engage with practical advice on marketing your cybersecurity expertise within your organization and strategies for transitioning into security roles. We also touch on key managerial concepts essential for conquering the CISSP exam. From tackling practice questions to understanding the nuances of firewall architecture, this episode serves as a comprehensive guide to excel in your cybersecurity journey. With a focus on balancing innovative technology with organizational needs, listeners are encouraged to think beyond binary solutions and embrace a managerial mindset in their path to becoming cybersecurity leaders.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Send us a textUnlock the secrets to cybersecurity success with Sean Gerber as your guide, promising not just knowledge but mastery of domain five for your CISSP exam. Will you be the one who finally understands the intricacies of identity and access management, or the latest defense tactics against the alarming rise of ransomware attacks? These are just a few of the critical insights we explore, providing you with the practical tools needed to safeguard organizations and ensure business resilience in today's digital battleground.As we navigate the complex world of identity governance and privileged access management, Sean unpacks the transformative power of multi-factor authentication and single sign-on in solidifying security protocols. Discover how the principle of least privilege can be your organization's best friend in minimizing breach risks and achieving compliance. Beyond just passing an exam, this episode arms you with insights that will make you an indispensable force in cybersecurity. Plus, explore the robust resources available through CISSP Cyber Training, designed to propel you towards certification success. Don't miss your chance to become an asset in the ever-evolving world of cybersecurity.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Join us as we share our thoughts and feelings about the official teaser for Marvel Studios' The Fantastic Four: First Steps! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
It's time for our annual State of the MCU address! On its way back up from “a bit of a low point” after Deadpool & Wolverine, 2025 looms large as an important year for the MCU to reconnect with its audience and build toward the culmination of The Multiverse Saga. Join us as we discuss what's at stake and preview the entire Marvel Studios, Television, and Animation slate for 2025! Your Friendly Neighborhood Spider-Man (out now) Captain America: Brave New World (Feb 14) Daredevil: Born Again (March 4) Thunderbolts* (May 2) Ironheart (June 24) The Fantastic Four: First Steps (July 25) Eyes of Wakanda (August 6) Marvel Zombies (October) Wonder Man (December) Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Send us a textUnlock the secrets to mastering the CISSP exam with insights that could transform your cybersecurity career. Have you ever considered how failing to change a default router password could be your greatest vulnerability? Join me, Sean Gerber, as I guide you through the essential topics that every aspiring security professional needs to understand as we step into 2025. From administrative to regulatory investigations, this episode covers the diverse landscape of investigation types and underscores the importance of staying vigilant against cyber threats like man-in-the-middle attacks and DDoS attacks. In this episode, we unravel the complexities of digital evidence and the crucial role of e-discovery in legal proceedings. Learn about the Electronic Discovery Reference Model (EDRM) and how it serves as a cornerstone for managing electronic evidence. We dive into the nuances of maintaining evidence integrity, the legalities of digital forensics, and the critical importance of a robust data retention strategy. As we dissect computer crimes and their impacts, you'll gain a deeper appreciation for the challenges and intricacies involved in handling cybersecurity incidents.Concluding with a rich discussion on ethical and legal investigation procedures, we highlight key regulatory frameworks such as GDPR and CCPA. Understand the importance of obtaining consent for monitoring and maintaining a chain of custody for evidence. With practical tips and resources, including those from ReduceCyberRisk.com, this episode equips you with the knowledge to not only pass the CISSP exam but to thrive in an ever-evolving cybersecurity landscape. Whether you're a seasoned professional or new to the field, you'll find valuable insights to bolster your defense against the relentless advance of cyber threats.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every month for the next 12 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Send us a textCould you navigate the complexities of cybersecurity like a pro and walk confidently into the CISSP exam? Join us as Sean Gerber shares his expert insights on conquering common test pitfalls and emphasizes the crucial strategy of thinking like a manager. From mastering the art of pacing to trusting your instincts, you'll gain valuable knowledge on how to read questions methodically and manage your time effectively. Plus, we're not just examining theoretical knowledge—Sean breaks it down into practical applications, particularly when assessing the security risks associated with commercial off-the-shelf software.In today's cloud-reliant world, understanding service evaluation best practices is essential. We explore the critical considerations in managing services like SaaS, IaaS, and PaaS. Learn which questions to prioritize when engaging with service providers, such as inquiring about their data protection strategies, encryption standards, and compliance with essential frameworks like SOC 2 and ISO 27017. Discover how the shared responsibility model for IaaS impacts your security measures, and unlock the secrets to secure API configurations. We also stress the importance of thorough risk assessment, threat modeling, and adhering to secure development standards like ISO 27034 and IEC 62443.Software selection is a major decision, and due diligence can make all the difference. This episode unravels how to rigorously evaluate software vendors, focusing on credibility, security assessments, and compliance with industry standards. With Sean's guidance, you'll learn to conduct comprehensive code reviews, penetration tests, and evaluate vendor support. We also highlight strategic deployment planning, emphasizing API security, threat modeling, and a robust mitigation plan. Finally, we unveil the extensive cybersecurity services offered by Reduce Cyber Risk, paired with exciting news about an upcoming podcast designed to bolster your cybersecurity knowledge even further.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Send us a textUnlock the secrets of cybersecurity mastery with me, Sean Gerber, on this week's episode of the CISSP Cyber Training Podcast. Discover why the U.S. government is investing a staggering $3 billion to replace TP-Link routers and the strategic implications for telecom companies nationwide. We'll also dissect the National Defense Authorization Act, which aims to fortify AI adoption and tackle emerging threats through an AI Security Center. This isn't just a glimpse into current events—it's your roadmap to staying ahead in the ever-evolving world of cybersecurity. Explore critical security practices, like the nuances of service level agreements and the essentials of privileged access management, tailored to elevate your cybersecurity strategies. Learn how to balance regulatory compliance with productivity by refining need-to-know policies and harness the power of data classification. Additionally, consider the wide array of consulting services from ReduceCyberRisk.com, including penetration testing and virtual CISO services, for those seeking to deepen their expertise or find mentorship. As we close, I extend warm holiday wishes and share enthusiasm for the opportunities ahead in 2025. Don't miss out on these valuable insights—your future in cybersecurity starts here.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Send us a textCan AI-driven technologies reshape the way we secure our digital world? Join me, Sean Gerber, as we navigate the fascinating landscape of cybersecurity challenges anticipated by 2025. Our latest podcast episode promises to shed light on the emerging threats posed by AI, particularly within the finance and e-commerce sectors. We explore the necessity of incorporating AI into security frameworks and examine the shifting dynamics of cybersecurity insurance powered by AI-driven risk assessments. The conversation takes a thought-provoking turn with the exploration of quantum-resilient encryption's impact on global privacy laws and an increased focus on DevOps security, zero trust models, and the ever-looming threat of nation-state cyber warfare. What strategies are essential when dealing with stubborn vendors and critical vulnerabilities? We'll tackle this and more in a segment dedicated to vulnerability management and its ethical considerations. Learn the significance of documenting exceptions, deploying compensating controls, and the vital role of private collaboration and escalation in managing vendor reluctance. We also provide insights into handling false positives from vulnerability scans and the art of communicating risks to stakeholders under budget constraints. This discussion places a spotlight on strategic communication and ethical decision-making as cornerstones of effective cybersecurity risk management.Uncover the secrets to mastering vulnerability management with a strategic flair. We'll guide you through scenarios where high-severity issues persist despite a reduction in overall vulnerabilities, emphasizing coordinated efforts within multi-cloud settings. You'll gain insights into best practices for risk mitigation when immediate patching isn't feasible and the ethical and legal intricacies of vulnerability disclosure. In addition, there's a focus on presenting a risk management approach that balances cost with potential impact to senior leaders. As a bonus, we offer resources for those gearing up for the CISSP exam and seeking cybersecurity consulting, equipping you with the knowledge to fortify your defense against cyber threats.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Send us a textUnlock the secrets to safeguarding your organization against cyber threats as we explore critical components of cybersecurity. Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we dissect domain 6.4 of the CISSP exam. Discover the latest insights into cyber threats that target U.S. critical infrastructure, with a particular focus on an Iranian-linked group's custom cyber weapon. Learn how understanding your organization's technology, both hardware and software, can be pivotal in mitigating potential threats, especially in industries like oil and gas.Navigate the labyrinth of vulnerability scan reporting and analysis as we dive into the challenging yet rewarding art of communicating security assessment findings. Whether done internally or through third-party services, the objective is to translate technical data into actionable insights for technical teams. We tackle the complexities of overwhelming scan results and highlight the value of automated reporting, ensuring an efficient and effective approach to vulnerability management. Learn how to prioritize risks, provide clear remediation recommendations, and utilize trend analysis to track progress and tackle recurring vulnerabilities.Finally, explore the strategies needed for executing effective internal and external security scans. Discover the importance of thorough preparation and strategic planning, managing insider threats, and safeguarding public-facing assets. We delve into the complexities of third-party scans, emphasizing the need to understand and manage network connections to prevent unauthorized access. Throughout this episode, we stress the critical role of alignment and collaboration in cybersecurity efforts, providing you with the tools and guidance needed to enhance your security posture in today's complex landscape.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Send us a textCould the lack of hardware and firmware knowledge be the Achilles' heel of today's cybersecurity efforts? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we unpack the critical challenges faced by IT and security leaders, particularly in hardware-intensive sectors like manufacturing. We expose the concerning gaps in understanding that are leaving organizations vulnerable, and propose actionable solutions like fostering stronger collaboration between IT teams, security personnel, and suppliers. Tackling the prevalent issue of BIOS password sharing, we recommend secure password management tools, like CyberArk, and advocate for a shift from the culture of replacing devices to one of repair and repurposing, all while ensuring data is securely erased to prevent breaches.Shifting focus to authentication and password security, this episode dives into the essentials of Role-Based Access Control (RBAC), two-factor authentication, and the power of identity federation with protocols like SAML or OAuth. We dissect the benefits of Single Sign-On (SSO) for seamless multi-application access, while highlighting the necessity of identity proofing during onboarding. Finally, we take a hard look at common password pitfalls, stressing the importance of robust security practices. Our mission? To empower listeners with the knowledge and resources they need to bolster their cybersecurity measures—visit CISSP Cyber Training and ReduceCyberRisk.com for a deeper dive into fortifying your defenses.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Andy is joined by Sean Gerber to discuss the first two episodes of James Gunn's Creature Commandos as well as discuss Gunn's latest comments about the upcoming Lanterns. Find more Holy BatCast on the internet: Web | Twitter | Facebook | Instagram | YouTube | Patreon Rate, review, & subscribe to Holy BatCast on: Apple Podcasts | Spotify | Google Play | iHeartRadio | Stitcher | TuneIn Your feedback is appreciated. Send emails to holybatcast@rf4rm.com
Send us a textUnlock the secrets of safeguarding your digital empire with an urgent cybersecurity update from Sean Gerber on the CISSP Cyber Training Podcast. Imagine a vulnerability so severe it's rated at a critical level of 10—this is the reality for Atlassian Confluence users, and immediate action is non-negotiable. Arm yourself with strategies from CISSP domain 5.5.1 that shape the provisioning, onboarding, and maintenance of systems. Learn how to craft robust account management plans that are the keystone in your organization's defense against breaches.Transform your team into a frontline defense force with our insights on creating impactful employee security awareness training. We tackle the power of a simple one-page document to revolutionize your approach, especially if you're the lone security warrior in your firm. Discover how understanding industry standards like GDPR and CMMC can empower your workforce to act as vigilant sensors against potential threats. We also touch on how to navigate the complexities of multinational teams, ensuring inclusive and effective cybersecurity dialogues.Close the doors on security threats by mastering the deprovisioning and offboarding processes. Elevate your knowledge with the significance of automating the removal of stale accounts, reducing the risk of hackers exploiting overlooked credentials. Dive deep into Role-Based Access Control (RBAC) and password management strategies that align permissions with job roles, simplifying security while mitigating risks. With compelling insights into password policies and the need for senior leadership buy-in, you'll be equipped to advocate for enhanced security measures that protect your organization.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Send us a textDiscover how a ransomware attack nearly brought vodka titan Stoli to its knees, pushing the company to the brink of bankruptcy with a staggering $78 million debt. This episode promises a compelling exploration of the catastrophic impact on their ERP systems and the urgent need for a solid business resiliency plan. Join me, Sean Gerber, as we unravel the complexities of managing IT risks, the geopolitical challenges faced by companies like Stoli, and the critical importance of conveying these risks to senior leadership—especially when regulatory deadlines loom.On a technical front, we'll demystify the nuances between IPsec transport and tunnel modes, breaking down misconceptions and shining a light on potential vulnerabilities such as outdated TLS versions. Learn why HSTS and DNS over HTTPS might not be the silver bullets they appear to be, and how HTTPS, while robust, isn't immune to phishing threats. This episode is an essential guide for cybersecurity professionals keen on fortifying their defenses against the relentless and evolving threats in today's digital landscape. Tune in for a rich blend of analysis and insights that underscore the vital role of awareness and technical knowledge in safeguarding our digital world.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Join us for our spoiler breakdown of the finale that proves that it really has been Agatha All Along! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Join us as we reach the end of The Witches' Road (but not this series) in our latest Agatha All Along spoiler review! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
The legendary Patti Lupone powers the stellar seventh episode of Agatha All Along. Join us for this spoiler breakdown! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We discuss how William Kaplan became Billy Maximoff and how this impacts the journey down The Witches' Road in our spoiler breakdown of the sixth episode of Agatha All Along! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Break out the Ouija board and listen along to our spoiler review of of the fifth episode of Agatha All Along! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Nothing like a little rock and roll to destroy a multigenerational curse! We present our spoiler breakdown of the fourth episode of Agatha All Along! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Time to travel The Witches' Road and experience our first trial! We explain why Sharon is the real MVP as we present our spoiler breakdown of the third episode of Agatha All Along! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We've got our first look at Thunderbolts* and we have thoughts! We examine Yelena's search for fulfillment, Bucky keeping an eye on (don't call her) Val, which side Sentry is on, Taskmaster's survival odds, and more. Join us as we break down one of our favorite Marvel Studios trailers in recent memory! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Yes, we're still talking about Deadpool & Wolverine because of course we are! In this episode, we turn our attention to the future! Join us as we discuss what's next for Deadpool, Wolverine, Cavillrine, X-23, Blade, The Gambit, Elektra, Anchor Beings, and more! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Sean examines several questions surrounding the return of Robert Downey Jr. to the MCU, this time as Doctor Doom (?) in Avengers: Doomsday and Avengers: Secret Wars (and perhaps beyond). This includes the potential motivations behind this decision and the intense responses from fans, both positive and negative. There's a lot to process here. Hosted by Sean Gerber. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Deadpool & Wolverine has arrived as a brilliant, awesome, thrilling, hilarious, and emotional love letter to superhero-based cinema and one universe (in addition to the MCU) that will always matter and never be forgotten. Hear our thoughts in this comprehensive spoiler review (hint: we loved it… a lot)! Hosted by Sean Gerber. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
Sean shares his thoughts on the teaser trailer for Captain America: Brave New World, including Marvel Studios' decision to show the Red Hulk (and what they held back). Hosted by Sean Gerber. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We're strolling down memory lane as we approach Deadpool & Wolverine, revisiting several Marvel mutant movies from the past 24 years. We've now arrived at what was billed as the end of Hugh Jackman's time as Wolverine… Logan! We discuss the journey to this film, much of which was about preparing to say goodbye. We then share our thoughts after a recent rewatch and how this movie maintains its special place in history even though Hugh Jackman has returned. Homework is never required in the MCU, but a little X-tra Credit may add extra enjoyment to D&W! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We're strolling down memory lane as we approach Deadpool & Wolverine, revisiting several Marvel mutant movies from the past 24 years. We've now reached the end of the block. Deadpool 2 is our final X-tra Credit assignment (for now). Join us as we discuss the journey to a sequel that had to compete for attention in a way its predecessor had not. We also share our thoughts after a recent rewatch, which has one of our hosts feeling quite differently than he did in 2018. Homework is never required in the MCU, but a little X-tra Credit may add extra enjoyment to D&W! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We're strolling down memory lane as we approach Deadpool & Wolverine, revisiting several Marvel mutant movies from the past 24 years. We've now arrived at the only beginning of Wade Wilson's cinematic story that anyone wants to count… Deadpool! We discuss the remarkable, one-of-a-kind journey to this film and share memories of how it all culminated with our first viewings. We then discuss if/how our opinions have shifted over the past 8 years including thoughts from our recent rewatch. Homework is never required in the MCU, but a little X-tra Credit may add extra enjoyment to D&W! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We're strolling down memory lane as we approach Deadpool & Wolverine, revisiting several Marvel mutant movies from the past 24 years, continuing with X-Men Origins: Wolverine (2009)! Join us as we share our memories of the promising and then troubled journey to this film. We also discuss seeing Origins for the first time before examining if/how our opinions have changed since those first impressions (spoiler: not really). Homework is never required in the MCU, but a little X-tra Credit may add extra enjoyment to D&W! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We're strolling down memory lane as we approach Deadpool & Wolverine, revisiting several Marvel mutant movies from the past 24 years, continuing with X2: X-Men United (2003)! Join us as we share our memories of the journey to this film, which arrived in a world that had rapidly evolved in the three years since X-Men (2000). We also discuss seeing X2 for the first time before examining if/how our opinions have changed since those first impressions. Homework is never required in the MCU, but a little X-tra Credit may add extra enjoyment to D&W! Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!
We're strolling down memory lane as we approach Deadpool & Wolverine, revisiting several Marvel mutant movies from the past 24 years, starting with X-Men (2000). Join us as we share our memories of the journey to the film and seeing it for the first time before examining if/how our opinions have changed since those first impressions. Homework is never required in the MCU, but a little X-tra Credit may add extra enjoyment to D&W. Hosted by Sean Gerber and Paul Hermann. Follow MCU Fan Show on Instagram and X (formerly Twitter)!