Podcast: What is a zero-day exploit? - Reference from WhatIs.com

Reference

Podcast: What is a zero-day exploit?

 In this podcast from WhatIs.com, assistant editor Alex Howard Howard interviews unified threat management expert Steve Fallin. One of the original architects of WatchGuard Technologies' popular LiveSecurity Service, Steve has spent the last seven years researching, writing, and speaking about network security for the small- to medium-size enterprise.

Download this podcast to learn the following:

  • What zero-day exploits are
  • What your organization can do to prevent them
  • What you can do to minimize the damage from a successful exploit
  • Which sources of information you need to track to stay current with fast-changing patch requirement and vulnerabilities.

Listen on your PC or download to your favorite portable media player:
Download MP3

 


Subscribe to the feed for WhatIs.com's Tech Buzzword of the Week.

To manually add the XML feed ( RSS ) for the podcast series, copy and paste the following link into your Web browser or iTunes or whatever podcast subscription tool you use:
http://feeds.feedburner.com/WhatiscomItBuzzword-of-the-week .

 


Search the audio content for specific keywords and jump directly to them with Podzinger:

 


What is podcasting? Read our definition.

 

This was last updated in April 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • frequency-hopping spread spectrum

    - Frequency hopping is one of two basic modulation techniques used in spread spectrum signal transmission. (SearchNetworking.com)

  • SS7 attack

    - While the SS7 network is fundamental to cellphones and its operators, the security of the design relied entirely on trust. The SS7 network operators counted on one another to play by the rules. Now... (WhatIs.com)

  • single sign-on (SSO)

    - Single sign-on is a session and user authentication process in which a user can access multiple applications with one name and password. (SearchSecurity.com)

Glossaries

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Podcast: What is a zero-day exploit?Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.