
Sign up to save your podcasts
Or


Send us a text
What if your organization's data could be breached through an exposed API in your modem? Join me, Sean Gerber, in this week's CISSP Cyber Training Podcast as we unravel the hidden dangers of API connections and dive into the latest security flaws found in Cox modems. We'll also kick off our thrilling CISSP Question Thursday, tackling complex queries from domains 3.1.2 and 3.1.3. Plus, discover why AES-256 stands as the gold standard for cloud data encryption and how implementing custom APIs with complex database schemas can fortify abstraction and access controls within your systems.
In another gripping segment, we break down the pillars of network segmentation and data protection, showcasing their critical roles in crafting a robust cybersecurity framework. Understand the nuances of data hiding through network segmentation, the essentiality of encrypting data at every stage, and the profound impact of secure boot in maintaining system integrity. We also discuss the pitfalls of storing encryption keys on poorly secured servers and the vital function of hashing algorithms for software verification. Wrap up with a detailed exploration of the dual-edged sword of patching vulnerabilities, ensuring you leave equipped with actionable insights for your CISSP exam and your cybersecurity career.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!
By Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur4.4
3232 ratings
Send us a text
What if your organization's data could be breached through an exposed API in your modem? Join me, Sean Gerber, in this week's CISSP Cyber Training Podcast as we unravel the hidden dangers of API connections and dive into the latest security flaws found in Cox modems. We'll also kick off our thrilling CISSP Question Thursday, tackling complex queries from domains 3.1.2 and 3.1.3. Plus, discover why AES-256 stands as the gold standard for cloud data encryption and how implementing custom APIs with complex database schemas can fortify abstraction and access controls within your systems.
In another gripping segment, we break down the pillars of network segmentation and data protection, showcasing their critical roles in crafting a robust cybersecurity framework. Understand the nuances of data hiding through network segmentation, the essentiality of encrypting data at every stage, and the profound impact of secure boot in maintaining system integrity. We also discuss the pitfalls of storing encryption keys on poorly secured servers and the vital function of hashing algorithms for software verification. Wrap up with a detailed exploration of the dual-edged sword of patching vulnerabilities, ensuring you leave equipped with actionable insights for your CISSP exam and your cybersecurity career.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!

184 Listeners

2,001 Listeners

370 Listeners

375 Listeners

637 Listeners

1,017 Listeners

322 Listeners

8,010 Listeners

175 Listeners

314 Listeners

189 Listeners

73 Listeners

134 Listeners

44 Listeners

168 Listeners