On the Risky Business Podcast, Patrick Gray and Adam Boileau discussed the telco vulnerabilities that enabled the recent Salt Typhoon attacks. They also shared insights on how #Cape could be positioned to address these challenges. “There are a number of things in the telco world that are difficult to solve at the edge of the network—things like SS7, tracking, metadata leakage, call records… You can’t really solve [those] at the network edge. You have to do that in the middle of the network… Having a telco where security is a part of their value proposition as a company… would be a good thing.” Listen to the full discussion here: https://lnkd.in/ea2pxMjH
Cape’s Post
More Relevant Posts
-
🎙 Episode 28 is out now featuring the wonderful Vincent Scott from Defense Cybersecurity Group 🔔 We had Vincent join us to discuss the CMMC phase rollout and what the implementation could look like. We've read the 32 CFR final rule (multiple times), but what does this truly look like in the coming months? Questions we discuss: 🔸 How many Lead CCAs are there? 🔸 When will you see assessment requirements in contracts? 🔸 Will there be any phase extensions? We loved having Vincent on the show to talk with us and theorize what the implementation could look like. We, again, are not claiming CMMC Bible with this. It's just a discussion that we thought we should have on the podcast because MANY people, businessowners, contractors have been asking us. We'd love to hear your thoughts in the comments as well! ⤵ Full link in the comments 💡
To view or add a comment, sign in
-
What can we do today to prevent tomorrow’s breach? CardinalOps CEO and Co-Founder, Michael Mumcuoglu, joined the Enterprise Security Weekly podcast to talk about how MITRE's ATT&CK framework can help defenders better prepare for inevitable attack TTPs they'll have knocking on their doors. https://hubs.li/Q02nKjR50
To view or add a comment, sign in
-
Defensive Security Podcast Episode 283 is out for your ear taste buds! "They Can't All Be Winners" In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat explore several pressing cybersecurity topics as of October 2024. The discussion begins by addressing the rapid increase in vulnerability exploitation speeds, with a highlight that 70% of exploitable flaws in 2023 were zero-days, now being exploited within just five days. They stress the importance of effective patch management and prioritization tactics using tools like the CISA KEV list and Tenable's Viper score. https://lnkd.in/ecsfjd_x
To view or add a comment, sign in
-
A great podcast by Information Security Media Group (ISMG) delving into why hackers target weekends and holidays. Here are some strategies to navigate these peak attack times: - Leveraging #Partnerships to #BolsterStaffing during the #HolidaySeason. - Ensuring your Incident Response Plans (#IRPs) are current and validated, enhancing the organization's ability to manage attacks effectively. For more info listen to the full podcasts. #StayInformed. #StaySafe.
Why Hackers Love Weekend and Holiday Attacks
bankinfosecurity.com
To view or add a comment, sign in
-
In this episode of Cyber Threat Perspective, Spencer Alessi and Brad Causey, CISSP discuss the various locations where unsecured credentials can be found, providing valuable insights and tips for IT admins and pen testers. Here's what you can find in this episode: • Probing custom web apps: Discover how pen testers can read log files and request certain files to uncover hidden credentials. • Exploring application configuration files: Learn why it's crucial to search for .NET configuration files during pen testing for potential username and password exposures. • Active Directory attribute hunt: Find out where sensitive data, including outdated credentials, can often be found in Active Directory and how PowerShell logs can help identify potential breaches. • File shares: Delve into the world of file shares, where both sensitive data and unsecured credentials can be uncovered, making it a target for pen testers and red team members. • Document Management Systems (DMS): Gain insights into the vulnerabilities and security risks associated with DMS and how users sometimes inadvertently use it as a password manager. Watch or listen to the full episode: https://lnkd.in/g4VzTft9 --- 🔒 Follow and connect with SecurIT360 for consulting, guidance, and implementation of security protocols for your organization, anchored by our 24/7 SOC.
Episode 65: Unsecured Credentials and Where To Find Them - Offensive Security Blog - SecurIT360
https://offsec.blog
To view or add a comment, sign in
-
A thorough security blueprint should be standard practice and #duediligence for every company's when it comes to security. But making sure those security measures allow for future growth should also be factored in. w/ Andy Cagnetta on The Deal Board Podcast #MergersandAcquisitions #infrastructure https://lnkd.in/eiGF79Se
Don't be vulnerable to overlooked security risks!
https://www.youtube.com/
To view or add a comment, sign in
-
Have you read Rapid7's 2024 Attack Intelligence Report? 🔎 💡For the last four years, Rapid7 has analyzed attacker and vulnerability data to give security teams insight into the tactics, trends, and motives adversaries are deploying against them. It has become required reading for those charged with keeping their networks secure. 🎤 At Infosecurity Europe, we spoke to Christiaan Beek about the company's upcoming podcast with EM360 and the key trends and challenges that will be discussed in its Attack Intelligence Report. 👉 Listen to the full podcast with EM360 HERE: https://lnkd.in/e4aNA7at 📑 Download the full Rapid7 Attack Intelligence Report HERE: https://lnkd.in/eXjSNXpt #rapid7 #attackintelligence #infosecurityeurope
A Sneak Peak into Rapid 7's Attack Intelligence Report with Christiaan Beek
To view or add a comment, sign in
-
🛡️ If you're a #mssp not delivering #holistic #monitoring for your clients, here's a great #podcast from Secureworks where we discuss why it's imperative. Discover why it's your #clients best #defense in today's fast-evolving #threat landscape. 🌐💻 🎧 Tune in now and transform your #security approach: #taegis #xdr #stopthebadguys #ransomeware Bud Ellis
Holistic Monitoring: Why Now and What's the Benefit? | Let's Talk SOC Podcast | S2E18
secureworks.com
To view or add a comment, sign in
-
Yesterday, at it-sa – Home of IT Security, I talked to Thomas Maxeiner from Palo Alto Networks about the threat landscape and how organizations can become more resilient. The podcast episode will be available soon at data://disrupted.
To view or add a comment, sign in
-
-
What five questions should you ask an OT vendor before sealing the deal? Get ready for Thursday's episode featuring Managing Consultant Philip Marasco, an OT and ICS Security expert 🔒 Tune in for insights on assessing vendors, boosting cybersecurity with management consoles, and overcoming risk challenges in OT environments 🤩 Don't miss out - catch us on all major podcast platforms this Thursday! 🎙
To view or add a comment, sign in
Connection without compromise
3wGreat insights!