Logo

    tech talks

    Explore "tech talks" with insightful episodes like "Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation", "Episode 50: Top Ten Cybersecurity Misconfigurations: Insufficient Internal Network Monitoring", "Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications.", "Episode 47: Top Ten Cybersecurity Misconfigurations: Intro" and "Episode 46: 15 Ways to Protect your Business from a Cyber Attack: SIEM/Log Management" from podcasts like ""Geek Speak - Tech Talks with Envision IT", "Geek Speak - Tech Talks with Envision IT", "Geek Speak - Tech Talks with Envision IT", "Geek Speak - Tech Talks with Envision IT" and "Geek Speak - Tech Talks with Envision IT"" and more!

    Episodes (17)

    Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation

    Episode 51: Top Ten Cybersecurity Misconfigurations: Lack of Network Segmentation
    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Lack of Network Segmentation. Having proper security boundaries within a network is a vital step to keeping your information safe from bad actors. 

    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com

    Episode 50: Top Ten Cybersecurity Misconfigurations: Insufficient Internal Network Monitoring

    Episode 50: Top Ten Cybersecurity Misconfigurations:  Insufficient Internal Network Monitoring
    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Insufficient Internal Network Monitoring. Insufficient internal network monitoring plays an important role to detecting threats in order to help keep you and your employees safe from cyber-attacks. 

    Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications.

    Episode 48: Top Ten Cybersecurity Misconfigurations: Default Configurations of Software and Applications.

    Join us over the next ten weeks as we discuss the top ten cybersecurity misconfigurations and review ways you can keep your organization safe from cyberattacks! In this episode we'll discuss one of the ten ways: Default Configurations of Software and Applications. 

    Connect with us:

    Episode 46: 15 Ways to Protect your Business from a Cyber Attack: SIEM/Log Management

    Episode 46: 15 Ways to Protect your Business from a Cyber Attack: SIEM/Log Management
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #15: SIEM/Log Management. Security information and event management, also known as SIEM plays an important role in detecting security threats and keeping your and your employees safe.

    Episode 45: 15 Ways to Protect your Business from a Cyber Attack: Cyber Insurance

    Episode 45: 15 Ways to Protect your Business from a Cyber Attack: Cyber Insurance
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #14: Cyber Insurance. In the event of a cyber-attack, cyber insurance can help cover losses that may occur.
     

    Episode 44: 15 Ways to Protect your Business from a Cyber Attack: Web Gateway Security

    Episode 44: 15 Ways to Protect your Business from a Cyber Attack: Web Gateway Security
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #13: Web Gateway Security. Web Gateway Security takes a layered approach to protect you and your employees from harmful malware.
     

    Episode 43: 15 Ways to Protect your Business from a Cyber Attack: Mobile Device Security

    Episode 43: 15 Ways to Protect your Business from a Cyber Attack: Mobile Device Security
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #12: Mobile Device Security. With the high usage of mobile devices in work environments it is important for you and your employees to understand the importance that mobile security plays in protecting you from compromise.
     

    Episode 41: 15 Ways to Protect your Business from a Cyber Attack: Dark Web Research

    Episode 41: 15 Ways to Protect your Business from a Cyber Attack: Dark Web Research
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #10: Dark Web Research. Dark web research can help find leaked or stolen information such as compromised passwords, breached credentials, or other sensitive information. This is an important piece to help keep you and your employee's valuable information safe from breaches and other cyber-attacks.
     

    Episode 40: 15 Ways to Protect your Business from a Cyber Attack: Computer Updates

    Episode 40: 15 Ways to Protect your Business from a Cyber Attack: Computer Updates
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #9: Computer Updates. Compter updates play an important role in keeping you and your employees safe from cyber-attacks.
     

    Episode 37: 15 Ways to Protect your Business from a Cyber Attack: SAT

    Episode 37: 15 Ways to Protect your Business from a Cyber Attack: SAT
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #6: Security Awareness Training. Making sure you and your employees know how to avoid scams and phishing attacks is vital to keeping your company safe from compromise.
     
     

    Episode 36: 15 Ways to Protect your Business from a Cyber Attack: MFA

    Episode 36: 15 Ways to Protect your Business from a Cyber Attack: MFA
    In this series we're focusing on 15 Ways to Keep Your Organization Safe from Cyber Attacks - in this episode we'll focus on way #5: Multi-Factor Authentication. MFA gives you control over who has access to your accounts and helps keep you and your data secure. 
     

    Episode 29: LastPass Security Incident and Recommendations

    Episode 29: LastPass Security Incident and Recommendations

    LastPass sent out a communication to their customers indicating they had detected “unusual activity” within their environment. What actions you should take now depends on your situation. If you are uncomfortable staying with LastPass you should still absolutely use a great password manager, consider Keeper Security (great for businesses) or Bitwarden (great for personal/families).

    Connect with us:
    https://www.linkedin.com/company/envisionitllc
    marketing@envisionitllc.com

    #65 - KI und AR Forschung?! - Über Tech-Zukunftstrends und die wissenschaftliche Arbeit am Fraunhofer IGD

    #65 - KI und AR Forschung?! - Über Tech-Zukunftstrends und die wissenschaftliche Arbeit  am Fraunhofer IGD
    An was arbeitet die Forschung eigentlich im Bereich KI oder AR? In dieser Episode des ITCS Pizzatime Tech Podcasts wird Euch Dr. Mario Aehnelt, Head of Visual Assistance Technologies vom Fraunhofer IGD, einen Einblick in die wissenschaftliche Arbeit zu technologischen Zukunftstrends, wie KI oder auch VR und deren Umsetzung ein Industrie- und Forschungsprojekten geben. Der ITCS Pizzatime Podcast ist Teil des **ITCS und ITCS Online**! – Tech Konferenz, IT Jobmesse & Festival – schnapp dir dein **kostenloses Ticket** hier: https://www.it-cs.io/ Redaktion: Katharina Bauriedel & Matthias Walenda // Moderation: Leonie Peyerl // Schnitt: Simon Peyerl // Produktion: Umbeck & Walenda Media GmbH.

    71: Memorable Tech Talks, The Ultimate Guide - Nina Zakharenko

    71: Memorable Tech Talks, The Ultimate Guide - Nina Zakharenko

    Nina Zakharenko gives some great advice about giving tech talks.
    We talk about a blog series that Nina wrote called "The Ultimate Guide To Memorable Tech Talks". This episode is full of great help and encouragement for your own public speaking adventures.

    Some of what we discuss:

    • overcoming the fear of public speaking
    • breathing and pausing during talks
    • planning your talk as well as planning your time to get ready for the talk
    • writing proposals and getting feedback on proposals
    • Nina's talk in PyCascades on programming Adafruit chips
    • types of talks that are often rejected
    • pre-recording demos to avoid live demo problems
    • why you should speak, even if you are an introvert
    • benefits of public speaking
    • a super cool announcement at the end

    Special Guest: Nina Zakharenko.

    Sponsored By:

    Links: