
Sign up to save your podcasts
Or
Enjoying the content? Let us know your feedback!
Ensuring an optimum setup of your toolsets is a critical part of the your ongoing mitigation effort.
Is this episode we will look at the do's and don't of setting up your endpoint detection and response:
- www.nist.gov: NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
- csrc.nist.gov: Lightweight Cryptography
- www.theregister.com: Uncle Sam wants to strip the IoS out of IoT with light crypto
- www.zdnet.com: Tiny IoT devices are getting their own special encryption algorithms
- www.cisa.gov: ESXiArgs Ransomware Virtual Machine Recovery Guidance
- github.com: ESXiArgs-Recover
- www.theregister.com: Among the thousands of ESXiArgs ransomware victims? FBI and CISA to the rescue
-https://blogs.cisco.com: An easier way to secure your endpoints
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
Enjoying the content? Let us know your feedback!
Ensuring an optimum setup of your toolsets is a critical part of the your ongoing mitigation effort.
Is this episode we will look at the do's and don't of setting up your endpoint detection and response:
- www.nist.gov: NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
- csrc.nist.gov: Lightweight Cryptography
- www.theregister.com: Uncle Sam wants to strip the IoS out of IoT with light crypto
- www.zdnet.com: Tiny IoT devices are getting their own special encryption algorithms
- www.cisa.gov: ESXiArgs Ransomware Virtual Machine Recovery Guidance
- github.com: ESXiArgs-Recover
- www.theregister.com: Among the thousands of ESXiArgs ransomware victims? FBI and CISA to the rescue
-https://blogs.cisco.com: An easier way to secure your endpoints
Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.
111,235 Listeners