Cyber Security Happy Hour Podcast
Intex IT
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https://intexit.co.uk/podcast Instagram Instagram.com/cybersechappy
Categories: Technology
Listen to the last episode:
Welcome to Episode 42 of the Cyber Security Happy Hour Podcast, with your host, Christie. In this gripping episode, I interview Alexander Rogan and Christian Rogan, co-founders of Platinum High Integrity Technologies. They discuss their disruptive Cyber Security solution, a technology that works at ring zero, effectively blocking unauthorised binary codes from deploying onto the system. This game-changing approach confronts malware before it can do damage, ensuring cyber safety. Tune in as they shed light on how their technology eliminates the need for constant updates and struggles with false positives. We dive deep into the advanced realm of Cyber Security, discussing innovative technologies that offer a powerful shield against potential cyber-attacks. In this lively conversation, we explore unique approaches to protect core systems and combat notorious hacker groups worldwide. Offering insights into the dual-authority systems, I reveal how they reduce the risk of system breaches and impede unauthorised system changes. Alexander and Christian also explain how their advanced technology, Abatis®, counters persistent cyber-attacks, securing systems from the most modern versions of Windows to legacy OS. The discussion extends to explore the financial implications of using Abatis® to secure critical assets. Alexander and Christian emphasise the staggering return on investment for enterprises, the potential to eliminate costly extended licenses, and the tremendous stress reduction for security operations centre (SOC) analysts. They suggest introducing Abatis® even before compliance standards such as PCI DSS are enacted, owing to its comprehensive threat analysis and advanced preventative measures. Additionally, we delve into ways to counter insider threats, the limitations of existing security solutions, and the transitions to AI-based solutions. Alexander and Christian highlight the rising costs of maintaining current security infrastructure and the significance of proactive measures in countering cyber threats. They round up the discussion by shedding light on their plans to explore future applications of Abatis®, including cellular protection, Android security, Linux systems protection, and IoT. Join us in this compelling episode to understand how Platinum High Integrity Technologies is revolutionising Cyber Security by offering simplicity, cost-effectiveness, and proactive protection. You find out further information about Abatis® at https://platinum-hit.com/ Follow of Platinum High Integrity Technologist on LinkedIn https://www.linkedin.com/company/platinum-high-integrity-technologies/ Enjoy! You can listen on: At Intex IT Website: https://intexit.co.uk/podcast/ ITUNES: https://podcasts.apple.com/gb/podcast/cyber-security-happy-hour/id1515379723/ Do not forget to subscribe to the podcast so you never miss an episode. #podcast #CyberSecurity #InfoSec #DataProtection #PrivacyMatters #ThreatIntelligence #ZeroTrust #SecureTheFuture #CyberAware #RiskManagement #DigitalDefense #SecurityAwareness #Encryption #ITSecurity #CloudSecurity #HackerDefense #NetworkSecurity #PhishingPrevention #IdentityProtection #SecurityEducation #IncidentResponse #MalwareDefense #IoTSecurity #CyberResilience #SecureSoftware #PatchManagement #CISOInsights CyberHygiene #PasswordSecurity #CyberThreats #DigitalForensics #SecureInfrastructure #ThreatDetection #SecurityConsulting #IncidentResponse #DigitalSecurity #SecureSoftware #CloudSecurity #CyberSafe
Previous episodes
-
44 - Episode 42 Defenders of the Cyberverse - Insights from Alexander Rogan and Christian Rogan of Platinum High Integrity Technologist. Thu, 18 Apr 2024
-
43 - Episode 41 Demystifying Vulnerability Scans Wed, 13 Mar 2024 - 0h
-
42 - Episode 40 The Zero Trust Security Model Fri, 02 Feb 2024 - 0h
-
41 - Episode 39 Navigating the World of Cyber Security: A Conversation with Mora Awosile Wed, 20 Dec 2023 - 0h
-
40 - Episode 38 Remote work as a Cyber Security Professional Thu, 09 Nov 2023 - 0h
-
39 - Episode 37 Cyber Security for Small Businesses Mon, 09 Oct 2023 - 0h
-
38 - Episode 36 ISO 27001 SOA & Risk Treatment Plan Thu, 18 May 2023 - 0h
-
37 - Episode 35 Conducting an ISO 27001 Risk Assessment Wed, 03 May 2023 - 0h
-
36 - Episode 34 ISO 27001 Gap Analysis Mon, 20 Mar 2023 - 0h
-
35 - Episode 33 Defining your ISO 27001 ISMS Scope Mon, 06 Mar 2023 - 0h
-
34 - Episode 32 Changes to ISO/IEC 27001(2022) Sun, 12 Feb 2023 - 0h
-
33 - Episode 31 Cyber Security vs Physical Security Tue, 06 Sep 2022 - 0h
-
32 - Episode 30 Cyber Forensics Thu, 26 May 2022 - 0h
-
31 - Episode 29 With Arijit Biswas Chief Technical Officer speaks about Cyber Security at Diamanté Blockchain Tue, 11 Jan 2022 - 0h
-
30 - Episode 28 Log4J Vulnerabilities Tue, 04 Jan 2022 - 0h
-
29 - Episode 27 Why you need Cyber Insurance Tue, 07 Dec 2021 - 0h
-
28 - Episode 26 Robinhood‘s Data Breach - Cyber Attack Tue, 09 Nov 2021 - 0h
-
27 - Episode 25 Four Lessons Learnt from Squid Game that applies to Cyber Security Tue, 26 Oct 2021 - 0h
-
26 - Episode 23 So you want to be a Bug Bounty Hunter? Mon, 11 Oct 2021 - 0h
-
25 - Cyber Security Topics Mon, 20 Sep 2021 - 0h
-
24 - Episode 2 IOT Device Security Tue, 12 May 2020 - 0h
-
23 - Episode 1 Secure Password Thu, 07 May 2020 - 0h
-
22 - Episode 22 Biometrics in Cyber Security Wed, 05 May 2021 - 0h
-
21 - Episode 21 DDoS (Distributed Denial of Service) Attacks Tue, 13 Apr 2021 - 0h
-
20 - Episode 20 The Insider Threat Tue, 16 Mar 2021 - 0h
-
19 - Episode 19 Public Wi-Fi Security Tue, 02 Mar 2021 - 0h
-
18 - Episode 18 Ransomware Tue, 16 Feb 2021 - 0h
-
17 - Episode 17 Data Breaches Wed, 27 Jan 2021 - 0h
-
16 - Episode 16 - 5 Safety Tips For Shopping Online Tue, 12 Jan 2021 - 0h
-
15 - Episode 15 Top 10 Cyber Security Risks of 2020 Tue, 22 Dec 2020 - 0h
-
14 - Episode 14 Cyber Essentials Certification Overview Tue, 01 Dec 2020 - 0h
-
13 - Episode 13 Spyware Tue, 03 Nov 2020 - 0h
-
12 - Episode 12 Risk and Countermeasures of IOT Devices Tue, 20 Oct 2020 - 0h
-
11 - Episode 11 Cyber Attack Threat - The Malicious Insider Tue, 29 Sep 2020 - 0h
-
10 - Episode 10 Cyber Risk Management Process Tue, 15 Sep 2020 - 0h
-
9 - Episode 9 Cyber Security and Privacy Tue, 01 Sep 2020 - 0h
-
8 - Episode 8 How Artificial Intelligence can be used in Cyber Security Tue, 18 Aug 2020 - 0h
-
7 - Episode 7 How to get into Cyber Security Tue, 04 Aug 2020 - 0h
-
6 - Episode 6 WhatsApp Encryption Tue, 14 Jul 2020 - 0h
-
5 - Episode 5 Protecting your Mobile Devices and have more Privacy Tue, 30 Jun 2020 - 0h
-
4 - Episode 4 Impact from Covid-19 on Cyber Security Jobs Thu, 11 Jun 2020 - 0h
-
3 - Episode 3 Recovering from Phishing Attack Tue, 26 May 2020 - 0h