Gesamtlänge aller Episoden: 5 days 11 hours 32 minutes
Researchers discuss their work, to be presented at Black Hat, on how AD “misconfiguration debt” lays out a dizzying array of attack paths, like that in the PetitPotam exploit.
Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure.
Nothing good, now that the ransomware gang’s servers have vanished mid-negotiation, as ransomware negotiator Kurtis Minder details on Threatpost podcast.
Podcast: Former spyware insider, current mobile white hat hacker Adam Weinberg on how to block 3 types of spyware attacks.
SophosLabs Principal Researcher Andrew Brandt discusses what makes organizations prime targets for ransomware threat actors, what steps could help them to protect themselves, and what’s stopping them from implementing those steps.
"Trust is a human emotion. Computers don't have emotions. They don't need that trust, inherently" – that's the heart of Zero Trust cybersecurity, and SASE is how to make it happen. Forcepoint’s Nico Fischbach, global CTO and VPE of SASE, and...
Forcepoint’s Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk: particularly important as security perimeters have expanded due to the pandemic.
In this Threatpost podcast, Fortinet’s top researcher sketches out the ransom landscape, with takeaways from the DarkSide attack on Colonial Pipeline.
In this Threatpost podcast, Forcepoint’s SASE and Zero Trust director describes how the pandemic jump-started SASE adoption for easier, more affordable security.
Trend Micro's Mayra Fuentes talks about the threat actors on 600+ monitored forums who requisition exploits and why they eschew bug bounty programs.