Artwork

Kandungan disediakan oleh Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !

CCT 125: Practice CISSP Questions - Integrity Unhashed through Ensuring Message Authenticity with the CISSP (D3.6)

19:25
 
Kongsi
 

Manage episode 408099302 series 3464644
Kandungan disediakan oleh Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

Send us a Text Message.

Embark on a transformative journey with me, Sean Gerber, as I share the pivotal moment of venturing into full-time cybersecurity consulting after a significant chapter of my career. It's a time of change and opportunity, not just for me but for the entire cybersecurity landscape, as we witness the shockwaves of a ransomware attack on Change Healthcare and its repercussions on entities like UnitedHealthcare. In this episode, we peel back the layers of this incident to reveal the harsh realities and potential regulatory upheavals that could redefine industry standards and hold executives' feet to the fire. Get ready for an essential discussion on the intersection of cybersecurity and accountability and how it impacts us as professionals in the field.
As we navigate these turbulent waters, we also unravel the complexities of checksums and cryptographic hash functions. Understand why CRCs can't keep your data under wraps and the vital importance of collision resistance in hashing algorithms. We go beyond basic error detection and step into a world where digital signatures and certificates are the sentinels guarding our digital identities. This deep dive into the technical underpinnings of cybersecurity doesn't just prepare you for the CISSP exam; it arms you with the knowledge to fortify your data against the evolving threats in the cyber realm. Tune in and bolster your defenses with insights from the forefront of cybersecurity.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Bab

1. CISSP Cyber Training Podcast (00:00:00)

2. Difference Between Checksum and Hash Functions (00:06:35)

155 episod

Artwork
iconKongsi
 
Manage episode 408099302 series 3464644
Kandungan disediakan oleh Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

Send us a Text Message.

Embark on a transformative journey with me, Sean Gerber, as I share the pivotal moment of venturing into full-time cybersecurity consulting after a significant chapter of my career. It's a time of change and opportunity, not just for me but for the entire cybersecurity landscape, as we witness the shockwaves of a ransomware attack on Change Healthcare and its repercussions on entities like UnitedHealthcare. In this episode, we peel back the layers of this incident to reveal the harsh realities and potential regulatory upheavals that could redefine industry standards and hold executives' feet to the fire. Get ready for an essential discussion on the intersection of cybersecurity and accountability and how it impacts us as professionals in the field.
As we navigate these turbulent waters, we also unravel the complexities of checksums and cryptographic hash functions. Understand why CRCs can't keep your data under wraps and the vital importance of collision resistance in hashing algorithms. We go beyond basic error detection and step into a world where digital signatures and certificates are the sentinels guarding our digital identities. This deep dive into the technical underpinnings of cybersecurity doesn't just prepare you for the CISSP exam; it arms you with the knowledge to fortify your data against the evolving threats in the cyber realm. Tune in and bolster your defenses with insights from the forefront of cybersecurity.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Bab

1. CISSP Cyber Training Podcast (00:00:00)

2. Difference Between Checksum and Hash Functions (00:06:35)

155 episod

Semua episod

×
 
Loading …

Selamat datang ke Player FM

Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.

 

Panduan Rujukan Pantas

Podcast Teratas