Showing results by author "National Security Agency" in All Categories
-
-
No Such Podcast
- Written by: National Security Agency (NSA)
- Original Recording
-
Overall
-
Performance
-
Story
No Such Podcast pulls back the curtain on the National Security Agency. NSA’s very existence used to be classified, leading to its nickname, “No Such Agency.” Now, we’ve got stories to tell, and they just might surprise you! Hear from everyone at NSA, from senior leaders down to new hires, talk about what it’s really like to work at one of the most secretive agencies in the government.
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
-
-
-
Tips For: Quantum-Readiness
- Migration to Post-Quantum Cryptography
- Written by: Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), National Institute of Standards and Technology (NIST)
- Narrated by: Tom Brooks
- Length: 1 hr and 36 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the National Institute of Standards and Technology (NIST) created this factsheet to inform organizations—especially those that support critical infrastructure—about the impacts of quantum capabilities and to encourage the early planning for migration to post-quantum cryptographic standards by developing a quantum-readiness road map.
-
Tips For: Quantum-Readiness
- Migration to Post-Quantum Cryptography
- Narrated by: Tom Brooks
- Length: 1 hr and 36 mins
- Release date: 2023-09-08
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
2021 NSA Cybersecurity Year in Review
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 2 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
The National Security Agency (NSA) formed a Cybersecurity Directorate in 2019 with the charge to prevent and eradicate threats to the United States’ National Security Systems and critical infrastructure, with an initial focus on the Defense Industrial Base and its service providers. Drawing on the NSA’s rich information assurance legacy, the Cybersecurity Directorate refocused to meet the demands of the present and the future. It integrated key parts of the NSA’s cybersecurity mission into a more public-facing organization determined to raise the cybersecurity bar.
-
2021 NSA Cybersecurity Year in Review
- Narrated by: Tom Brooks
- Length: 2 hrs and 5 mins
- Release date: 2022-04-11
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
Network Infrastructure Security Guidance
- National Security Agency Cybersecurity Technical Report
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 3 hrs and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Guidance for securing networks continues to evolve as new vulnerabilities are exploited by adversaries, new security features are implemented, and new methods of securing devices are identified. All networks are at risk of compromise, especially if devices are not properly configured and maintained. This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network.
-
Network Infrastructure Security Guidance
- National Security Agency Cybersecurity Technical Report
- Narrated by: Tom Brooks
- Length: 3 hrs and 38 mins
- Release date: 2022-03-21
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $18.74 or 1 Credit
Sale price: $18.74 or 1 Credit
-
-
-
Chinese State-Sponsored Cyber Operations
- Observed TTPs
- Written by: The National Security Agency CISA and FBI
- Narrated by: Tom Brooks
- Length: 2 hrs and 16 mins
- Unabridged
-
Overall
-
Performance
-
Story
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) assess that People’s Republic of China's state-sponsored malicious cyberactivity is a major threat to the US and allied cyberspace assets.
-
Chinese State-Sponsored Cyber Operations
- Observed TTPs
- Narrated by: Tom Brooks
- Length: 2 hrs and 16 mins
- Release date: 2021-07-29
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
The NSA Tips: Software Memory Safety
- National Security Agency April 2023
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 1 hr and 38 mins
- Unabridged
-
Overall
-
Performance
-
Story
Modern society relies heavily on software-based automation, implicitly trusting developers to write software that operates in the expected way and cannot be compromised for malicious purposes. While developers often perform rigorous testing to prepare the logic in software for surprising conditions, exploitable software vulnerabilities are still frequently based on memory issues. Examples include overflowing a memory buffer and leveraging issues with how software allocates and de-allocates memory.
-
The NSA Tips: Software Memory Safety
- National Security Agency April 2023
- Narrated by: Tom Brooks
- Length: 1 hr and 38 mins
- Release date: 2023-05-15
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 1 hr and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Don't be a victim! Malicious cyber actors may leverage your home network to gain access to personal, private, and confidential information. Help protect yourself, your family, and your work by practicing cybersecurity-aware behaviors, observing some basic configuration guidelines, and implementing the following mitigations on your home network.
-
Best Practices for Securing Your Home Network
- Cybersecurity Information February 2023
- Narrated by: Tom Brooks
- Length: 1 hr and 33 mins
- Release date: 2023-04-18
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
NSA Tips
- Blacklotus Mitigation Guide
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 1 hr and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
BlackLotus is a recently publicized malware product garnering significant attention within tech media. Similar to 2020’s BootHole (CVE-2020-10713), BlackLotus takes advantage of a boot loader flaw—specifically CVE-2022-21894 Secure Boot bypass known as “Baton Drop”—to take control of an endpoint from the earliest phase of software boot.
-
NSA Tips
- Blacklotus Mitigation Guide
- Narrated by: Tom Brooks
- Length: 1 hr and 44 mins
- Release date: 2023-07-03
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
The NSA Tips
- Hunting Russian Intelligence "Snake" Malware: May 2023
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 3 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service (FSB) for long-term intelligence collection on sensitive targets. To conduct operations using this tool, the FSB created a covert peer-to-peer (P2P) network of numerous Snake-infected computers worldwide.
-
The NSA Tips
- Hunting Russian Intelligence "Snake" Malware: May 2023
- Narrated by: Tom Brooks
- Length: 3 hrs and 11 mins
- Release date: 2023-05-30
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $18.74 or 1 Credit
Sale price: $18.74 or 1 Credit
-
-
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 2 hrs and 12 mins
- Unabridged
-
Overall
-
Performance
-
Story
The dramatic increase in cyber compromises over the past five years, specifically of software supply chains, prompted intense scrutiny of measures to strengthen the resilience of supply chains for software used throughout government and critical infrastructure. Several policies and working groups at multiple levels within the U.S. Government focus on this need to ensure the authenticity, integrity, and trustworthiness of software products.
-
Tips: Recommendations for Software Bill of Materials (SBOM) Management
- Narrated by: Tom Brooks
- Length: 2 hrs and 12 mins
- Release date: 2024-01-11
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
2023 NSA Cybersecurity in Review
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 3 hrs
- Unabridged
-
Overall
-
Performance
-
Story
Since World War II, the National Security Agency (NSA) and its predecessors have protected the United States’ most sensitive information. As technological advancements have created a more interconnected world with ever-increasing threats, NSA’s mission has expanded. NSA has embraced new responsibilities and operational authorities to ensure our networks remain secure.
-
2023 NSA Cybersecurity in Review
- Narrated by: Tom Brooks
- Length: 3 hrs
- Release date: 2023-12-28
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $18.74 or 1 Credit
Sale price: $18.74 or 1 Credit
-
-
-
Tips for: Securing the Software Supply Chain
- Recommended Practices for Managing Open-Source Software and Software Bill of Materials
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 3 hrs and 45 mins
- Unabridged
-
Overall
-
Performance
-
Story
Unmitigated vulnerabilities in the software supply chain continue to pose a significant risk to organizations and our nation. This paper builds on the previously released Recommended Practices Guide for a software supply chain’s development, production and distribution, and management processes, to further increase the resiliency of these processes against compromise.
-
Tips for: Securing the Software Supply Chain
- Recommended Practices for Managing Open-Source Software and Software Bill of Materials
- Narrated by: Tom Brooks
- Length: 3 hrs and 45 mins
- Release date: 2023-12-20
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $18.74 or 1 Credit
Sale price: $18.74 or 1 Credit
-
-
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Written by: Cybersecurity National Security Agency
- Narrated by: Tom Brooks
- Length: 3 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Enduring Security Framework1 established a working panel comprised of government and industry experts and conducted an in-depth review of the fifth-generation technology for broadband cellular networks standalone network slicing network architecture. This panel assessed the security, risks, benefits, design, deployment, operations, and maintenance of a 5G standalone network slice over two papers: Parts 1 and 2.
-
Tips For: 5G Network Slicing
- Security Considerations for Design, Deployment, and Maintenance
- Narrated by: Tom Brooks
- Length: 3 hrs and 32 mins
- Release date: 2023-08-22
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $18.74 or 1 Credit
Sale price: $18.74 or 1 Credit
-
-
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Written by: National Security Agency, CISA
- Narrated by: Tom Brooks
- Length: 3 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint cybersecurity advisory (CSA) to highlight the most common cybersecurity misconfigurations in large organizations, and detail the tactics, techniques, and procedures (TTPs) actors use to exploit these misconfigurations. Through NSA and CISA Red and Blue team assessments, as well as through the activities of NSA and CISA Hunt and Incident Response teams, the agencies identified the following 10 most common network misconfigurations.
-
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
- Narrated by: Tom Brooks
- Length: 3 hrs and 11 mins
- Release date: 2023-10-19
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $18.74 or 1 Credit
Sale price: $18.74 or 1 Credit
-
-
-
Developer and Vendor Challenges Identity and Access Management
- Written by: National Security Agency (NSA), Infrastructure Security Agency (CISA)
- Narrated by: Tom Brooks
- Length: 2 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Since the introduction of multi-user computer systems, user authentication has primarily relied on the use of usernames and passwords. To strengthen the authentication process, Multi-Factor Authentication (MFA) requires the user to present multiple elements in different categories, or “factors,” as part of an authentication attempt. These factors are something you have, something you know, and something you are.
-
Developer and Vendor Challenges Identity and Access Management
- Narrated by: Tom Brooks
- Length: 2 hrs and 20 mins
- Release date: 2023-10-16
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-
-
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Written by: National Security Agency
- Narrated by: Tom Brooks
- Length: 1 hr and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Enterprise-grade servers, laptops, and desktops should be procured with a robust set of security artifacts, configurations, and capabilities. The security artifacts enable several risk mitigation techniques that should be used with an automated Acceptance Test process.
-
Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers
- Narrated by: Tom Brooks
- Length: 1 hr and 55 mins
- Release date: 2023-10-10
- Language: English
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.Add to Cart failed.
Please try again laterAdd to Wish List failed.
Please try again laterRemove from wish list failed.
Please try again laterFollow podcast failed
Unfollow podcast failed
Price: $8.71 or 1 Credit
Sale price: $8.71 or 1 Credit
-