It’s not often you get to talk to a real cybersecurity expert. Simon is an expert programmer, cyberforensics expert, and a security maven. Recently he exposed a criminal who used a VPN (Secure, private connection to the Internet) who thought he’d gotten away. Simon’s investigative abilities proved otherwise. Simon owns eVestigator, a company that specializes in helping victims of hacks, breaches, and other cybercrimes. He’s the real deal and has the track record to prove it. Just look at the list of his certifications and diplomas. He also has solved more than 350 cybersecurity and cybercrime cases.
During this podcast, we discussed the role of artificial intelligence in cybersecurity and the human element, its removal, and its requirement.
Preston and I were glad to speak to Simon and hope to have him back on the show to discuss other hot security topics.
Length: 23:31 minutes. Format: MP3. Rating: G for all audiences.
Preston and I had the pleasure of speaking with Infocyte founder Chris Gerritz about how companies can actually be hacked and not know it. It’s shocking to think that a company and its resources can be exposed for three, six, or more months and never have a clue. In fact, new reports tell us that your company probably has been hacked already, whether or not you have safeguards in place. Infocyte’s HUNT product searches for and finds malware infections.
Companies need to take the threat of compromise seriously. Anti-virus and anti-malware software isn’t enough nor is it always effective.
It’s clear that current real-time security processes are simply ineffective at detecting post-compromise activity, especially as time passes after the initial breach.
Infocyte HUNT approaches threat detection from a completely new perspective – by presuming endpoints are already compromised. It provides an easy-to-use, yet powerful solution to limit risk and manage the breach detection gap by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully evaded existing defenses and established a beachhead within the network.
Advanced persistent threats (APTs), hackers, malware, viruses, phishing schemes, and over-the-network hacks are a constant and a continuous threat. The only way to know if you’ve been hacked is with a thorough search for rootkits, Trojan horses, viruses, and other malware infections and signs of hacking.
In this 19 minute podcast, Chris Gerritz gives you an overview of the problem and his Infocyte HUNT product as a solution to finding threats on your network.
Length: 19:10 minutes. Format: MP3. Rating: G for all audiences.
Remember to stay secure.
Please retweet us and tell everyone you know about the SecurityNOW show. #SecurityNOW