Reference

Podcast: What is a zero-day exploit?

 In this podcast from WhatIs.com, assistant editor Alex Howard Howard interviews unified threat management expert Steve Fallin. One of the original architects of WatchGuard Technologies' popular LiveSecurity Service, Steve has spent the last seven years researching, writing, and speaking about network security for the small- to medium-size enterprise.

Download this podcast to learn the following:

  • What zero-day exploits are
  • What your organization can do to prevent them
  • What you can do to minimize the damage from a successful exploit
  • Which sources of information you need to track to stay current with fast-changing patch requirement and vulnerabilities.

Listen on your PC or download to your favorite portable media player:
Download MP3

 


Subscribe to the feed for WhatIs.com's Tech Buzzword of the Week.

To manually add the XML feed ( RSS ) for the podcast series, copy and paste the following link into your Web browser or iTunes or whatever podcast subscription tool you use:
http://feeds.feedburner.com/WhatiscomItBuzzword-of-the-week .

 


Search the audio content for specific keywords and jump directly to them with Podzinger:

 


What is podcasting? Read our definition.

 

This was last updated in April 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • air gapping

    - Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMP... (WhatIs.com)

  • equipment destruction attack

    - An equipment destruction attack, also known as a hardware destruction attack, is an exploit that destroys physical computer and electronic equipment. Equipment destruction attacks can be enabled s... (WhatIs.com)

  • covert redirect

    - Covert redirect is a security flaw that allows attackers to exploit an open redirect vulnerability. Open redirects are a failure to check that a redirected URL is a valid one. The covert redirect ... (WhatIs.com)

Glossaries

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Podcast: What is a zero-day exploit?Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.