AI fortifies cybersecurity but it also strengthens cyberthreats. How can your company tackle this double-edged dilemma? We’re asking our guest, Rob Lee, Chief of Research at the SANS Institute, the go-to leader in cybersecurity training.With mo
When it comes to physical school safety, K-12 districts are generally well-prepared and understand the risks when planning for fires, severe weather, or lockdowns. However, the situation is different when it comes to cybersecurity.As discussed
With K-12 schools going digital, they’re in the crosshairs for cybercriminals. Why are they such easy prey, and what’s being done to stop it?To answer these questions, we’ve invited K-12 cybersecurity expert Doug Levin, National Director at K12
The rules of B2B marketing have changed—traditional plays won’t cut it anymore. From AI content overload to dark social, five major disruptors are shaking up the game. Khali Henderson, Chief Content Officer at BuzzTheory, breaks down the new pl
We get a lot of inquiries from our viewers about Cybersecurity, but by far one of the most frequent questions we receive is, “How do I get into the cybersecurity industry?” It’s a vast and complex field, but today’s guest is here to help serve
Summary: In this special edition of Cybersecurity Simplified, host Susanna Song takes the global stage in Warsaw, Poland.You may not always hear about cyberattacks or feel the immediate impact, but cyberterrorism on the rise, targeting our ver
SIEM has been a cybersecurity standard as far back as 2005. Its job is to collect, correlate and analyze data from disparate sources for use in risk detection and forensic investigation. Over the last two decades SIEM has evolved to leverage ad
Cybercrime is relentless and keeps cybersecurity pros on their toes looking for creative and cutting-edge solutions to secure their operations. Worldwide investment in cybersecurity is now nearly $250 billion a year. What’s behind this huge n
The National Institute of Standards and Technology, or NIST, just issued version 2.0 of its Cybersecurity Framework (CSF), which emphasizes supply chain risk management and puts the C-Suite at the heart of cybersecurity management activities wi
Let’s imagine you have simple lock on your front door. Something a burglar or vandal could easily pick, gaining unrestricted access to your residence. Fearful of the potential loss you add a deadbolt lock to the door, making it much more diffic
When it comes to cybersecurity, most businesses focus on prevention and detection.That sounds reasonable, but today’s guest – a former CIA hacker, presidential cybersecurity commissioner and Air Force Cyber Wingman argues that approach is too l
In a world where cyber threats are now omnipresent, there’s no escape. Cyber victims come in all shapes and sizes – from the enterprise multi-billion-dollar companies to small and medium businesses, and even down to the individual user. Anyone
Breaking News: MGM and Caesar’s are two U.S. casino giants breached in a cyberattack costing them millions of dollars a day. What can you learn from the social engineered cyberattack? How can you prevent your business from becoming the next vic
Cybersecurity threats make news headlines daily. It’s hard to keep up – unless it’s your job like it’s ours at High Wire Networks. Our team meets daily to review the top cybersecurity news headlines. Today, we’re giving a sneak peek into our da
ChatGPT is the talk of the town, dominating tech conversations around the world. But like any AI-powered tool, it brings with it the good, the bad and the ugly. Is ChatGPT a blessing or a threat? A boon for business or the bane of our existence
The adoption of connected devices in medical practices and hospitals is rising quickly, improving operational efficiencies but also exposing your network to viruses and other threats. Our guest is Debe Gash, Senior Vice President and Chief Digi
In the fast-paced, continually evolving landscape of privacy and cybersecurity, the need for legal and operational compliance remains constant. So how do you build a legal compliance program for your digital operations to keep pace with ever-ch
Since the beginnings of computer networking technology, inventing new and better ways to secure networks has been vital to their use in the marketplace. From government applications to commercial, network security has been essential to protect
Cutting-edge cybersecurity solutions are critical … but a successful cybersecurity strategy needs a more holistic approach. To fully operationalize cybersecurity, your organization – your people – must embrace best practices to address advance
Over and above layering solutions to detect and protect against a cyberattacks, many companies also buy extra protection with cyber insurance to help them recover from a loss. But those policies aren’t easy to obtain or afford. And what about t
Can the difference between a healthy, growing managed security services business and a stagnant one lie in a simple methodology? In episode 36, we invite Ryan O'Hara, CEO of a Detroit-based MSP, to join the conversation. He shares how this one
Veteran Security Practitioner Rick Howard shares how Alan Turing’s ideas and Thomas Bayes' Theorem hold the key to how organizations should forecast risk. Most organizations default to heat maps relying on a low, medium, and high model. But the
We’re all well aware that a cyberattack can take a heavy toll on an organization’s financial and reputational status, but what about the emotional toll on the employees who’ve had to work through it?Our guests today are here to talk about just
“Unauthorized access” sounds like a line from the classic 1980s movie, Wargames. And you might be surprised to learn that the Computer Fraud & Abuse Act, or CFAA, was partly passed in response to that movie’s plot, as a way to thwart hackers.Bu
It isn’t lost to us here at Cybersecurity Simplified that many of you listen and watch because you have a keen interest in cybersecurity work… you want to make that career leap from wherever you are at or pivot for those of you already in IT or