Ndr 2 public
[search 0]
More
Download the App!
show episodes
 
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
  continue reading
 
Loading …
show series
 
The most common attack vector these days with ransomware is people. It's all about phishing, clicking on bad links, stolen credentials, et cetera, et cetera. And the key to preventing that attack vector is, of course, training and awareness. And that takes collaboration, both internally and across organizations. Our focus today is on municipalities…
  continue reading
 
How do you build out a sophisticated, enterprise-level cybersecurity posture when your mid-sized organization doesn’t even have a dedicated cybersecurity team, and even your vendors treat you like a small business? Turns out, the answer is pretty old school. It’s all about building the right relationships and setting the right priorities. Today we’…
  continue reading
 
For obvious reasons, financial institutions have always been a top target for cyberattacks, and almost one half of all cyberattacks target small and medium-sized businesses. So, it stands to reason that if you’re going to be in charge of security for a regional bank, you’ve really got to know your stuff. Today we’re chatting with Tyler Morgan, Chie…
  continue reading
 
Municipalities, including local, city, county, and state government have unique challenges when it comes to cybersecurity. Often reliant upon IT generalists to perform the security heavy lifting, municipalities rely on an abundance of tools, and people, to get the job done. We interviewed the IT directors of two city municipalities in Texas and lea…
  continue reading
 
We’re starting a new podcast series devoted to providing practical advice to pros trying to tackle their day-to-day cybersecurity challenges in the real world. To get there, we’re interviewing a few of our partners and customers, representing organizations of all shapes and sizes, and getting to know all the tools, policies, and procedures they rel…
  continue reading
 
Loading …

Quick Reference Guide