30 Minutes with a Hacker
30 Minutes with a Hacker
TD SYNNEX Corporation
Join us for an engaging monthly podcast series – “30 Minutes with a Hacker.” This series delivers insightful and thought-provoking discussions with some of our nation’s best and brightest ethical hackers and industry leaders. It’s not every day you get to listen in on talks with individuals who are frequently called on by the US government and military to help in/on operations to protect our country. This elite group of men and women are in the trenches daily, participating in the prevention of real-world cyber threats. Tapping into their mindshare on how hackers think to learn how we can guard ourselves against these kinds of attacks is both timely and relevant. You don’t want to miss this must-hear series.
Important Aspects of Deploying an Effective SIEM or XDR Solution
Join us as we discuss one of the critical elements for having a fighting chance against hackers. We dive into important elements of deploying an effective security information and event management (SIEM) solution and compare it to extended detection and response (XDR), something continuing to gain momentum in the marketplace for cybersecurity
May 25, 2022
30 min
Why Zero Trust is Critical to Effective Cybersecurity
Join us as we dive into one of the most critical shifts organizations can make to protect themselves against cyber attacks. Bad actors are most likely already in your network and have been, on average, for over 180 days, planning their next ransomware attack or other nefarious activity. What steps can you take to protect your organization?
Apr 26, 2022
32 min
The Most Critical Cybersecurity Vulnerability of the Last Decade
Join us as we discuss Log4j and Log4Shell, likely the greatest cybersecurity vulnerability of the past 40 years, and certainly of the last decade. This vulnerability impacts everyone using Windows, Linux, Apple (including IOS) – from large businesses to individuals, across the globe. Learn how to protect yourself against this massive threat, which unfortunately isn’t going away anytime soon.
Mar 10, 2022
31 min
Top 7 Cybersecurity Predictions for 2022
Is this the year the pendulum shifts back in favor of the good guys in the fight against cybercrime, or will we see the uphill climb only increasing? Join us as we share the top cybersecurity predictions for 2022 we are seeing in the channel from a global perspective, as we gear up and prepare for what is ahead.
Jan 18, 2022
33 min
Pros and Cons of Proposed Legislation to Allow ”Hacking Back”
Should an organization have the right to 'hack back' perpetrators who have attacked them with ransomware, malware, data theft or any other cyberattack? Should the company be able to steal their data back, or cause retribution to the entity that hacked them? Do organizations have a right to defend themselves against these bad actors? Join us as we dive into this topic and discuss the pros and cons of proposed bipartisan legislation to allow organizations to go on the offense and hack back.
Nov 15, 2021
34 min
Security Orchestration
As more tools become available to fight against cybercrime, leveraging them all properly becomes a daunting task for many organizations, especially those that are understaffed with expert talent. Sadly, that is most organizations, making it more critical for organizations to take a comprehensive approach and look at "security orchestration" as a way to have a fighting chance and not burnout out your team.  Join us as we uncover this topic in more detail, as it is vital to effective short and longterm cybersecurity.
Oct 12, 2021
32 min
Unveiling Cybercrime
Join us as we discuss who makes up the world of cybercrime today, look at their motivation, how they are organized, and how they work together. The ways in which bad actors communicate and share information is one of the biggest reasons why they are so effective. However, all is not lost — learn about the steps that can be taken to minimize the impact and lessen the chances of being the next victim to a cyber attack.
Sep 10, 2021
36 min
Why Vulnerability Assessments & Pen Tests are Critical to Protecting your Organization
Taking the proper steps to secure your organization is more critical today than at any time before. We dive into both vulnerability assessments and penetration testing to clear up some confusion we are seeing in the market, how to leverage both, and when.
Aug 17, 2021
29 min
July 4th Weekend Global Ransomware Attack and XDR Shift in the Industry
Over the July 4th weekend, one of the largest global ransomware attacks we have encountered to date occurred. Join us as we discuss this massive breach and how XDR technology is being utilized to counter attacks like these when deployed properly.
Jul 12, 2021
31 min
The JBS Meatpacking Plant Breach and Demystifying SASE
Following the Colonial Pipeline breach wass another major breach, this time targeting the largest meatpacker in the US. As we dive into the JBS meatpacking plant breach, we get into the importance of utilizing a technology call Secure Access Service Edge (SASE). Although SASE is rapidly being adopted in effective cybersecurity, there are a number of misconceptions. Join us as we demystify what SASE is really all about, how to leverage it and  the impact it can have in securing your organization.
Jun 14, 2021
29 min
Load more