1. EachPod

Data @ Rest - Podcast

Data @ Rest

"Data at Rest" is an accessible but informed discussion of current concepts, best practices, and personal experiences in computer security, network security, and information security overall, including interviews with expert guests and the history of each topic.

How To Education Technology Discussion
Update frequency
every day
Average duration
33 minutes
Episodes
45
Years Active
2019 - 2023
Share to:
Data at Rest 01x04: Perimeter Security

Data at Rest 01x04: Perimeter Security

Data at Rest - Episode 01x04: Perimeter Security

What is the "perimeter" of your network, and how has the definition of that concept changed over time? Also: the history of several physical and geogr…

01:00:23  |   Fri 13 Sep 2019
Data at Rest 01x03: Threat Detection

Data at Rest 01x03: Threat Detection

Data at Rest - Episode 01x03: Threat Detection

What is a threat? What is an exploit? Plus: the history and evolution of how we think about "insider" threats versus "outsider" threats.

The Orange Book

00:54:40  |   Fri 13 Sep 2019
Data at Rest 01x02: Endpoint Protection

Data at Rest 01x02: Endpoint Protection

Data at Rest - Episode 01x02: Endpoint Protection

What is a virus? Is there a difference between a virus and "malware"? And what can you do to protect your systems and your data? Join us for a discus…

00:45:09  |   Fri 13 Sep 2019
Data at Rest 01x01: Phishing

Data at Rest 01x01: Phishing

Data at Rest - Episode 01x01: Phishing

What is Phishing? What are some other common email scams, and how can you detect them? And did anyone ever free that Spanish prisoner? Join us for an accessible…

00:25:07  |   Fri 13 Sep 2019
Data at Rest 01x00: Welcome & Introductions

Data at Rest 01x00: Welcome & Introductions

Welcome to Episode Zero of Data at Rest, an information security podcast intended to present accessible, informed discussions of various topics in computer, network, and information security. If you'…

00:10:57  |   Fri 06 Sep 2019
Disclaimer: The podcast and artwork embedded on this page are the property of UNC Chapel Hill's Information Security Office & UNC Fayetteville State's Information Security Office. This content is not affiliated with or endorsed by eachpod.com.