CyberSecurity Summary

De: CyberSecurity Summary
  • Resumen

  • CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
    Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
    Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary
    Copyright CyberSecurity Summary
    Más Menos
Episodios
  • Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue
    May 1 2025
    Cybersecurity for Business is presented as a crucial element of national security and a significant concern for organizations across sectors. The included excerpts highlight the necessity of a comprehensive, top-down approach to cybersecurity, integrating it into all levels of business operations and decision-making, including the board of directors. The text emphasizes moving beyond traditional, IT-centric views to a holistic, enterprise-wide risk management strategy that includes legal, human resources, and financial considerations. Furthermore, the material underscores the importance of understanding and quantifying cyber risk in financial terms, adapting to the evolving threat landscape that includes sophisticated attackers and the challenges of new technologies. The book also examines the roles of various stakeholders, such as the General Counsel and the board, in fostering a culture of security and effectively managing cyber risks through planning, response, and continuous improvement.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cybersecurity-Business-Organization-Wide-Strategies-Ensure/dp/1398606146?&linkCode=ll1&tag=cvthunderx-20&linkId=ac919ca30cd9132035ab4f2f4db90ae2&language=en_US&ref_=as_li_ss_tl

    Más Menos
    21 m
  • Concurrency with Modern C++: What every professional C++ programmer should know about concurrency
    May 1 2025
    This comprehensive Book provides a detailed exploration of concurrency in modern C++, covering both fundamental concepts and advanced techniques. It explains the C++ memory model and various synchronization primitives like mutexes, locks, and condition variables, including C++20 additions such as jthread and semaphores. The text thoroughly examines concurrent data structures, offering insights into lock-based and lock-free implementations, and discusses potential challenges like data races and deadlocks. Furthermore, it introduces higher-level abstractions like futures, promises, packaged tasks, and coroutines, along with parallel algorithms from the STL and upcoming concurrency features in C++23 like executors and transactional memory. The book also presents established concurrency design patterns and best practices for writing efficient and well-defined multithreaded applications.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Concurrency-Modern-professional-programmer-concurrency/dp/B0CT41Q1FF?&linkCode=ll1&tag=cvthunderx-20&linkId=549033ab7b6e516051d7c3124aa76c03&language=en_US&ref_=as_li_ss_tl

    Más Menos
    42 m
  • Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications
    Apr 30 2025
    This excerpt from "Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications" by Kim Crawley serves as a comprehensive guide to penetration testing within major cloud platforms. It covers essential concepts, security implications, and practical techniques for assessing the security of applications and networks hosted on AWS, Azure, and GCP. The text details cloud-specific challenges, attack methodologies, and the shared responsibility model. It introduces various native and third-party tools for vulnerability scanning and exploitation within these environments, along with best practices for conducting tests and reporting findings, including the importance of purple teaming. Ultimately, the book aims to equip cybersecurity professionals with the knowledge to effectively perform red team engagements in cloud environments.

    You can listen and download our episodes for free on more than 10 different platforms:
    https://linktr.ee/cyber_security_summary

    Get the Book now from Amazon:
    https://www.amazon.com/Cloud-Penetration-Testing-Red-Teamers/dp/1803248483?&linkCode=ll1&tag=cvthunderx-20&linkId=b7efce2ab212083c7859a1861568caab&language=en_US&ref_=as_li_ss_tl
    Más Menos
    22 m
adbl_web_global_use_to_activate_webcro805_stickypopup

Lo que los oyentes dicen sobre CyberSecurity Summary

Calificaciones medias de los clientes

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.