cyber security

Uncategorized

How to Stop Windows Spying with hosts file

Windows 11 has a lot of telemetry and spying and connects to 3rd party data collection sites, in this video we will stop windows spying by adding a few entries to the hosts file and as a bonus get a fully blank clean browser tab.

Read More
Red Hat

In the Clouds (E27) ft. Matt Butcher

In this episode of In the Clouds, join your host Stu Miniman as he sits down with Fermyon CEO Matt Butcher, amidst their release of their new NoOps Database for developers building Serverless Applications; with WebAssembly. The Cloud Tech revolutionary is also open source and partners with Red Hat often in the field. Matt Butcher, […]

Read More
Security

What is Continuous Automated Red Teaming (CART)?

While red teaming evaluates an organization’s security stance at a specific time, it can prove costly and time-consuming. Enter Continuous Automated Red Teaming (CART), a game-changing approach that revolutionizes red teaming in cybersecurity. In this video, Sam Hector explains how by operating seamlessly round-the-clock, CART tackles these challenges head-on, delivering dynamic and cost-effective security assessments […]

Read More
Security

How Much Does a Data Breach Cost?

How much does it cost when hackers breach an organization’s cybersecurity? How long does it take to contain? How do you reduce the cost and recover faster? Jeff Crume provides a summary of the IBM Cost of a Data Breach 2023, the methodologies, and recommendations to improve your organization’s IT security and protect your data […]

Read More
Career Security

Get the Job You Want: Essential Cyber Security Projects for Beginners

This video from UnixGuy | Cyber Security Career  will help you start your cybersecurity career.. .

Read More
Security

Cybersecurity Modernization

Advances in AI are impacting many industry disciplines and cybersecurity is no different. The tried-and-true strategies for threat management and detection are evolving to take advantage of AI, making their approach more proactive. In this video from IBM Technology, Bob Kalka of presents the developing landscape of cybersecurity based on years of consulting with companies like […]

Read More
Security

Uncovering the History of STUXNET: The World’s First Cyber Weapon

When considering the impact of modern warfare, the gravity of cyber operations is very often overlooked by the general public. We have no idea where this is going. This video is from Upper Echelon. “Stuxnet” is the worlds first known Cyber Weapon. Initially deployed against Iran, the program eventually escaped containment, spreading to the world […]

Read More