Cygilant Cybersecurity Podcast-logo

Cygilant Cybersecurity Podcast

Technology Podcasts

Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.

Location:

United States

Description:

Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.

Twitter:

@cygilant

Language:

English


Episodes
Ask host to enable sharing for playback control

Episode 5 - This Week in Security - Feb 23, 2018 - Olympics Hack, Microsoft Edge and More

2/23/2018
Cygilant Director of Security Research, Neil Weitzel and his team discuss the biggest news in security this week.

Duration:00:30:56

Ask host to enable sharing for playback control

Episode 4: Gaming Security

2/8/2018
In this fourth episode, Cygilant Director of Security Research, Neil Weitzel and his team sit down to discuss gaming security.

Duration:00:07:37

Ask host to enable sharing for playback control

Episode 3: Patching and Patching Processes with Jake Cardinal

1/31/2018
In this third episode, Director of Security Research, Neil Weitzel, sits down with Jake Cardinal to discuss Patching and Patching Processes.

Duration:00:04:55

Ask host to enable sharing for playback control

Episode 2: Vulnerability Management with Miguel De Los Santos

12/14/2017
In this second episode, Miguel De Los Santos joins Cygilant Director of Security Research, Neil Weitzel to share thoughts on Vulnerability Management.

Duration:00:05:42

Ask host to enable sharing for playback control

Episode 1: Perimeter Security

11/20/2017
Today, I’d like to discuss perimeter security. If you’re unfamiliar with your perimeter, I like to define this as the point where you can actually begin controlling or tweaking your environment or network configuration. Let's discuss some of the ways to ensure you are securing your perimeter.

Duration:00:04:14