The Podcast Channel of AST Cybersecurity
Technology
About 2Secure:
Current attacks can’t be detected by standard tools like Antivirus and SIEM, as those new attacks are using “Living off the Land” or the use of “Automated compromise followed by human-led farming” attacks technics to avoid detection.
We know that keeping up with the latest cyber threats is not easy and that technology alone can easily fail at safeguarding your Digital assets.
Unlike other IT companies where security is just one menu item of what they do, at 2secure, securing your digital assets from unauthorized access is our sole focus.
About Yigal Behar:
Mr. Behar founded 2Secure in 2003 and this is his 2nd business.
Prior to his move to the USA from Israel he worked as a security consultant for Avnet Deloitte & Touche Information Security LTD. providing information security guidance to various clients including government bodies such as the Social Security Administration and The Office of The Prime Minister, financial institutions such as Hapoalim Bank, Mercantile Discount Bank and privately held companies.
Since 2004 Mr. Behar is constantly growing his business and sets the future vision and direction of the company. He likes to meet each client personally, providing a personal touch, along with his expertise in Cyber Security and business development.
Mr. Behar has over 30 years of an extensive experience in Cybersecurity & IT.
Inside The Latest CMMC 2.0 Updates: What You Need to Know
Cybersecurity Evangelist, Educator, and Architect: Eric Anderson
Wireless Threat Intelligence With CTO Brett Walkenhorst
The Latest Innovation In Cybersecurity: 24 X 7 X 365 SOC Services With Cyber Insurance
Building Trust Through Security: A CISO’s Insights
The Critical Role of Managed Services Providers in SMBs Cybersecurity
Making Cybersecurity Available to the Small Businesses
Welcome to Project Ares
A Completely Integrated Approach to Cybersecurity Viewed From The Threat Perspective
How Physical Security Is Just As Important As Cyber Security
Stopping Ransomware At The Hardware Level
Leverage Automation to Optimize Cyber Risk Management
The Latest In Weapons Detection Technology
Discover New Ways To Secure Your Source Code
Redefining Zero Trust For Remote Access
Exploring Data Protection with Brian Hileman
Get Your Cyber Risk Together Across All Attack Surfaces with Tal Morgenstern
Cybersecurity For Everyone
Discussing The Technology Field with Andrew Schear
Why Application Security is Ripe for Reinvention
Join Podbean Ads Marketplace and connect with engaged listeners.
Advertise Today
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room