itsecurity

Cybersecurity for SMBs: Protecting the Backbone of America

Cybersecurity for SMBs Protecting the Backbone of America

In this engaging `cybersecurity podcast`, we hear from `cybersecurity expert` Chase Cunningham as he introduces guests Maggie Dillon and Albert Whale, focusing on individuals who actively contribute to their field. This discussion provides valuable insights for `cybersecurity for entrepreneurs`, emphasizing `business protection` through proactive strategies. The conversation highlights the importance of a strong `founder mindset` […]

Cyber Chomps Episode #5 – Albert E. Whale, Maggie Dillon, and Alan Elliott, #Hacked2

Cyber Chomps Episode #5 Albert E. Whale, Maggie Dillon, and Alan Elliott, #Hacked2 Thank you and shout out to Joshua Bruyning for having us on the 5th episode of his podcast Cyber Chomps! Check out the latest from our #Hacked team, including Albert E. Whale, CEH CHS CISA CISSP BSEE CMMC-RP and Alan Elliott! Protecting your Data (both business and personal) […]

The High-Performance CEO Podcast – Episode #8: Using Cybersecurity Services to Protect Your Business with Albert Whale

The High-Performance CEO Podcast Episode #8: Using Cybersecurity Services to Protect Your Business with Albert Whale   https://podcast.sebastianschieke.com/2054032/11607512   THE HIGH-PERFORMANCE CEO PODCAST Episode #8: Using Cybersecurity Services to Protect Your Business with Albert Whale NOV 04, 2022 SEASON 1 EPISODE 8 Sebastian Schieke and Albert Whale In this week’s episode of The High-Performance CEO Podcast, Albert […]

Interview with Security Researcher (one of the Co-Authors) #HACKED2

I was honored to be interviewed by the Security Researcher.  He has a definite way with words, and we had a great conversation.  Here’s some extra information from his channel. Security Researcher: I have been working on some things for you. Real things that will help you better protect yourself from modern day cyber threats. […]

Medallion XLN Podcast Ep. 8

Cybersecurity is a field in computer science that is overlooked until it is too late. Albert E. Whale is an expert in the field of Cybersecurity and in Episode 8 of the Medallion XLN podcast we talk about his book #Hacked as well as his crowdfunding effort for ITS-SAFE as well as expert takes on how to […]

Digital Transformation: Cybersecurity, is it an Accelerator or Decelerator

    TiiQu Talk Panel Discussion: Digital Transformation: Cybersecurity, is it an Accelerator or Decelerator Another great Tiiqu Talks session with our CEO Albert Whale, we are discussing Cybersecurity in the Digital Transformation. #cybersecurity #digitaltransformation #hacked #itssafe #visibility

The Cyber Field Podcast

[vc_row][vc_column][vc_column_text] I was honored to be a guest speaker on The Cyber Field podcast with Tom Albert. We discussed the importance of developing a cybersecurity strategy and how to keep your business safe from cyber attacks. I shared my tips for protecting your company’s data, and we also talked about the unseen attacks. It was […]

Its time for a Paradigm Shift for cybersecurity

ITS Safe™ Security Appliance Seeing the Unseen A shift in the security paradigm needs to address the Unseen attacks in the environment. Detecting the Unseen activities in the environment explains why there are so many attacks being reported on a daily basis.  The unseen attacks depend on the ability of the attackers to hide in […]

Can you TRUST your vendors?

The FireEye and Solarwinds breach.   I was drinking my coffee this morning and I read that FireEye was Breached.  What?  I read that a second time.  This time I also found out that their testing tools were also stolen.  This is bad, I thought, because FireEye is used in many industries, but to suffer […]

KDKA News Radio Interview – April 9th, 2019

This is the interview on KDKA Radio News 1020AM, Pittsburgh, PA. This interview was on our ITS SafeTM Security appliance. Only the ITS Safe security appliance is a managed service. The KDKA Radio website posted the following for your review: https://kdkaradio.radio.com/articles/prevent-computer-network-your-business-being-hacked If the computer network of your company or business is not protected, the ITS […]