Artwork

Conteúdo fornecido por David Cristello and Jetpack Workflow. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por David Cristello and Jetpack Workflow ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !

How to Protect Your Accounting Firm From Cyber Attacks

33:54
 
Compartilhar
 

Manage episode 303483101 series 1056289
Conteúdo fornecido por David Cristello and Jetpack Workflow. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por David Cristello and Jetpack Workflow ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

Ken Pyle is a partner of CYBIR, specializing in Information Security, exploit development, penetration testing and enterprise risk management. Ken is a graduate professor of CyberSecurity at Chestnut Hill College. As an author, he has published several whitepapers and academic works on a wide range of topics including: Public Information and OSINT gathering via Social Networking, Advanced Social Engineering, Software Exploit Development, Reverse Engineering, Web Application & API hacking. Ken is a highly rated and popular lecturer on Information Security having presented at industry events such as DEFCON, ShmooCon, Secureworld, HTCIA International, and others. Ken is a frequently cited subject matter expert appearing in industry publications from Veracode, Accounting Today, Netdiligence, CyberScoop, and the New Jersey Law Journal. Ken has discovered and published a large number of critical software vulnerabilities in products from companies such as Cisco, Dell, Netgear, Sonicwall, HP, Datto, Kaseya, ManageEngine, among many others. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design. Hall of Fame Memberships / Acknowledgements (brief list): Sonicwall - https://psirt.global.sonicwall.com/hall-of-fame Schneider Electric - https://www.se.com/ww/en/work/support/cybersecurity/wall-of-thanks.jsp Manage Engine - https://www.manageengine.com/mobile-device-management/kb/mdm-cross-site-scripting-vulnerabilities.html West Wind Web - https://west-wind.com/wconnect/weblog/ShowEntry.blog?id=936 Dell - https://www.dell.com/support/kbdoc/en-us/000126459/security-acknowledgements

  continue reading

333 episódios

Artwork
iconCompartilhar
 
Manage episode 303483101 series 1056289
Conteúdo fornecido por David Cristello and Jetpack Workflow. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por David Cristello and Jetpack Workflow ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

Ken Pyle is a partner of CYBIR, specializing in Information Security, exploit development, penetration testing and enterprise risk management. Ken is a graduate professor of CyberSecurity at Chestnut Hill College. As an author, he has published several whitepapers and academic works on a wide range of topics including: Public Information and OSINT gathering via Social Networking, Advanced Social Engineering, Software Exploit Development, Reverse Engineering, Web Application & API hacking. Ken is a highly rated and popular lecturer on Information Security having presented at industry events such as DEFCON, ShmooCon, Secureworld, HTCIA International, and others. Ken is a frequently cited subject matter expert appearing in industry publications from Veracode, Accounting Today, Netdiligence, CyberScoop, and the New Jersey Law Journal. Ken has discovered and published a large number of critical software vulnerabilities in products from companies such as Cisco, Dell, Netgear, Sonicwall, HP, Datto, Kaseya, ManageEngine, among many others. He is currently working on a book concentrating on Cybersecurity, Forensics and Secure Design. Hall of Fame Memberships / Acknowledgements (brief list): Sonicwall - https://psirt.global.sonicwall.com/hall-of-fame Schneider Electric - https://www.se.com/ww/en/work/support/cybersecurity/wall-of-thanks.jsp Manage Engine - https://www.manageengine.com/mobile-device-management/kb/mdm-cross-site-scripting-vulnerabilities.html West Wind Web - https://west-wind.com/wconnect/weblog/ShowEntry.blog?id=936 Dell - https://www.dell.com/support/kbdoc/en-us/000126459/security-acknowledgements

  continue reading

333 episódios

Wszystkie odcinki

×
 
Loading …

Bem vindo ao Player FM!

O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.

 

Guia rápido de referências