Remote access tools can be an IT blessing, allowing tech support to quickly and remotely troubleshoot computer problems while reducing the need for lengthy conversations with confused employees. But just as remote access can be used for good, malicious cyberactors can leverage it to cause financial or even biological harm. In this episode of the ISACA® Podcast, security experts Dustin Brewer and Frank Downs explore different ways remote access tools can be exploited and how it can be avoided.
HCL State of Cybersecurity 2021
ISACA’s New CyberPro – Jon Brandt
ISACA Live: Emerging Tech - Cloud
ISACA Live: State of Cybersecurity Pt. 2
ISACA Live: Global Strategy
Digital Body Language
The Cybersecurity Workforce
ISACA Conference Europe – Keynote Speaker: Vinh Giang
Getting Started with Risk Quantification
Cyber Risk and Communicating to a Board of Directors
US DoD’s CMMC Guidelines — What You Need to Know
Security As A Service
IT Audit in Practice: Survival When You are Small-business Continuity and Resilience
Privacy-Preserving Analytics and Secure Multiparty Computation
Why Should I Listen to You?
The Lowdown on IoT
Breaking Down the ESET Threat Report
Cybersecurity Isn’t Real, Right? Wrong!
Building a Zero-Trust Network Platform
Advanced Security for Secret Information
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast