Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Excelsior Life: Distance EDU on Demand is an academic podcast series exploring a variety of education, business, and technology topics. Individual shows include 'Excelsior LIVE,' an interview series, ... more
FAQs about Excelsior Life:How many episodes does Excelsior Life have?The podcast currently has 100 episodes available.
October 30, 2015Today in Cybersecurity: Virtualization SecurityOnce an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 29, 2015Today in Cybersecurity: Insider versus Outsider ThreatsThreats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 28, 2015Today in Cybersecurity: Physical SecurityPhysical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. James Antonakos of the National Cybersecurity Institute explains....more8minPlay
October 27, 2015Today in Cybersecurity: HoneypotsA honeypot is a computer on a network that is deliberately vulnerable, in order to lure attackers away from other more critical systems. This keeps the attacker busy giving attention to a systems that has no real information on it. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 26, 2015Today in Cybersecurity: Separation of DutiesSeparation of duties, together with the principle of least privilege, are two important areas to address in order to reduce or eliminate fraud and protect the organization. One individual should not perform multiple duties, to prevent the possibility of improper actions. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 23, 2015Today in Cybersecurity: The Principle of Least PrivilegeAn individual should only be given the least amount of privilege necessary to do their job. Granting more access than is necessary can lead to unnecessary security violations. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 22, 2015Today in Cybersecurity: Access ControlAccess control is applied to packets on a network, connections between computers, and users and their ability to access files and folders on company systems. Controlling access is essential to security in keeping information out of the wrong hands. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 21, 2015Today in Cybersecurity: The CloudWhat is the cloud? Where is it located? How is our data protected while in the cloud? What happens when there is a problem within the cloud provider? Why is it important to read the cloud license agreement? James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 20, 2015Today in Cybersecurity: Penetration TestingPenetration testing is a process in which we try to infiltrate computers or devices on a network from the outside or the inside, typically using a black box test or a white box test. James Antonakos of the National Cybersecurity Institute explains....more8minPlay
October 19, 2015Today in Cybersecurity: BaseliningBaselining is a technique we use to enhance our security and alert us that something is not right and may need further investigation. Any behavior that does not fit the baseline should be considered suspicious until it is examined. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
FAQs about Excelsior Life:How many episodes does Excelsior Life have?The podcast currently has 100 episodes available.