Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Excelsior Life: Distance EDU on Demand is an academic podcast series exploring a variety of education, business, and technology topics. Individual shows include 'Excelsior LIVE,' an interview series, ... more
FAQs about Excelsior Life:How many episodes does Excelsior Life have?The podcast currently has 100 episodes available.
October 16, 2015Today in Cybersecurity: Disaster Recovery and Business ContinuityDisaster recovery is part of business continuity, and is concerned with getting essential services for the organization up and running as fast as possible after a disaster. Business continuity is concerned with the long-term health and growth of the company. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 15, 2015Today in Cybersecurity: PasswordsPasswords are the single most common thing we use to authenticate ourselves to a computer system. But it is surprising how little care people use in choosing and managing their passwords. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 14, 2015Today in Cybersecurity: Zero-day AttacksA zero-day attack is a malware attack that is so new it is not recognized by signature-based anti-virus software, and is therefore able to infect a system without detection. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 13, 2015Today in Cybersecurity: Computer ForensicsComputer forensics is a set of processes used to acquire and analyze digital evidence. This is useful in determining how malware entered a system and also for proving or disproving that information of a certain form exists or does not exist on a system. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 12, 2015Today in Cybersecurity: Risk AssessmentA risk assessment is used to identify assets within an organization, determine the threats to those assets, evaluate the probabilities of the asset being compromised, the impact to the organization, and a plan to mitigate or eliminate the risks. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 09, 2015Today in Cybersecurity: EncryptionEncryption is a process where we take information that is readable and make it unreadable. Symmetric encryption uses one key to encrypt and decrypt. Asymmetric encryption uses two keys: one key to encrypt and a second key to decrypt. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 08, 2015Today in Cybersecurity: BackupsJames Antonakos of the National Cybersecurity Institute explains the importance of performing backups on a regular basis, testing the backups to make sure they work, and with storing the backups off site so they are not destroyed during a disaster....more7minPlay
October 07, 2015Today in Cybersecurity: Social EngineeringJames Antonakos of the National Cybersecurity Institute explains social engineering. This technique is essentially clever lying or deception, where one human tricks another human to obtain information or access to a restricted area....more7minPlay
October 06, 2015Today in Cybersecurity: Layered SecuritySecurity must be built in layers, with each layer providing a different measure of security, such as hardware, software, and even human behavior. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
October 05, 2015Today in Cybersecurity: AuthenticationAuthentication is how a human proves who he or she is to a computer, using one or more of the following: something you know, something you have, or something you are. James Antonakos of the National Cybersecurity Institute explains....more7minPlay
FAQs about Excelsior Life:How many episodes does Excelsior Life have?The podcast currently has 100 episodes available.