Podcast: What is a zero-day exploit? - Reference from WhatIs.com

Reference

Podcast: What is a zero-day exploit?

 In this podcast from WhatIs.com, assistant editor Alex Howard Howard interviews unified threat management expert Steve Fallin. One of the original architects of WatchGuard Technologies' popular LiveSecurity Service, Steve has spent the last seven years researching, writing, and speaking about network security for the small- to medium-size enterprise.

Download this podcast to learn the following:

  • What zero-day exploits are
  • What your organization can do to prevent them
  • What you can do to minimize the damage from a successful exploit
  • Which sources of information you need to track to stay current with fast-changing patch requirement and vulnerabilities.

Listen on your PC or download to your favorite portable media player:
Download MP3

 


Subscribe to the feed for WhatIs.com's Tech Buzzword of the Week.

To manually add the XML feed ( RSS ) for the podcast series, copy and paste the following link into your Web browser or iTunes or whatever podcast subscription tool you use:
http://feeds.feedburner.com/WhatiscomItBuzzword-of-the-week .

 


Search the audio content for specific keywords and jump directly to them with Podzinger:

 


What is podcasting? Read our definition.

 

This was last updated in April 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • long-tail intrusion

    - Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and ... (WhatIs.com)

  • PKI (public key infrastructure)

    - A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the Inter... (SearchSecurity.com)

  • Pretty Good Privacy (PGP)

    - Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. (SearchSecurity.com)

Glossaries

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Podcast: What is a zero-day exploit?Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.