
Sign up to save your podcasts
Or


Send us Fan Mail
Ever wonder how safe your passwords really are? Brace yourself as we unravel the shocking details of the LastPass breach from August 2020, where countless customer credentials were stolen. We'll expose the vulnerabilities that allowed this to happen and advise on the necessary steps to preserve your digital security. You'll gain insights into reliable security measures, like the Harrison-Ruzel-Ohlmann model and Trusted Computing Base, and grasp how they can prevent data degradation.
Prepare to step into the intriguing world of unauthorized information flows. Our discussion aims to spotlight these silent threats and arm you with the knowledge to prevent them. We'll navigate through the complex maze of the Bell Laploula, BIBA, HRU, and Noninterference models, helping you understand their role in securing information. And if you're studying for the CISSP exam, you'll find our coverage of 20 questions on these topics an invaluable resource. Don't forget to check out CISSPcybertraining.com for more free CISSP questions, videos, and audio files. Join us for an episode that is more than just a conversation - it's a comprehensive guide to cybersecurity.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!
By Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur4.5
3333 ratings
Send us Fan Mail
Ever wonder how safe your passwords really are? Brace yourself as we unravel the shocking details of the LastPass breach from August 2020, where countless customer credentials were stolen. We'll expose the vulnerabilities that allowed this to happen and advise on the necessary steps to preserve your digital security. You'll gain insights into reliable security measures, like the Harrison-Ruzel-Ohlmann model and Trusted Computing Base, and grasp how they can prevent data degradation.
Prepare to step into the intriguing world of unauthorized information flows. Our discussion aims to spotlight these silent threats and arm you with the knowledge to prevent them. We'll navigate through the complex maze of the Bell Laploula, BIBA, HRU, and Noninterference models, helping you understand their role in securing information. And if you're studying for the CISSP exam, you'll find our coverage of 20 questions on these topics an invaluable resource. Don't forget to check out CISSPcybertraining.com for more free CISSP questions, videos, and audio files. Join us for an episode that is more than just a conversation - it's a comprehensive guide to cybersecurity.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!

78,708 Listeners

11,164 Listeners

154,168 Listeners

371 Listeners

630 Listeners

372 Listeners

1,026 Listeners

8,079 Listeners

176 Listeners

196 Listeners

73 Listeners

138 Listeners

686 Listeners

0 Listeners