<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Podcasts

Our podcasts are part of our knowledge-share initiative which covers cybersecurity news and updates along with other relevant topics with a fun twist

THTS Episode 4: Ranking Hacking Movies

Listen Now   Episode 4 Discusses: The Trend Micro Hack & Symantec Denies Claims of “Fxmsp” Breach plus ranking the best and worst hacking movies of all time. Including discussion of the following films: The Matrix (1999), Hackers (1995), WarGames (1983), Swordfish (2001), Ghost in the Shell (1996), Live Free or Die Hard (2007), Blackhat (2015), AntiTrust (2001), Johnny Mneomic (1995), The Net (1995).

THTS Episode 3: The Packet Advantage

Listen Now

THTS Episode 2: Cyber Detectives

Listen Now

    Transcript

    Sample Transcript Goes Here

    Blog Header

    This section is for the blog sub header

    What is Microsoft Defender for Endpoint and How Does it Work?

    Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, provides enterprise-level protection to endpoints to...


    Learn More

    What is the Zero Trust Framework?

    Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is...


    Learn More

    Behavioral Indicators of Insider Threat Activity

    Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and manag...


    Learn More