What can we do today to prevent tomorrow’s breach? CardinalOps CEO and Co-Founder, Michael Mumcuoglu, joined the Enterprise Security Weekly podcast to talk about how MITRE's ATT&CK framework can help defenders better prepare for inevitable attack TTPs they'll have knocking on their doors. https://hubs.li/Q02nKjR50
CardinalOps’ Post
More Relevant Posts
-
🗣️ New Ahead of the Breach Podcast! Sprocket Security's CEO and Found Casey Cammilleri sat down with Bindi Davé from DigiCert. https://lnkd.in/gbqGFztp A few key takeaways from the podcast. 1. Build the connective tissue in cybersecurity 🌉 2. Apply the business context for smarter risk management 💰 3. Collaboration is key to cybersecurity success 🔑 Check out the other episodes as well! https://lnkd.in/gdMMXiU9
DigiCert's Bindi Davé on Digital Trust in Cybersecurity
https://www.youtube.com/
To view or add a comment, sign in
-
[New Compounders Podcast] When I met Carl H., the CEO of Corero Network Security (LSE: CNS) (OTCQB: DDOSF), I knew I had to have him on the podcast. I don't come across many microcap companies that are developing a real niche in cybersecurity and partnering with large public companies to assist in threat mitigation. In this this excellent conversation, we covered: · What he thought was so compelling about the opportunity to lead Corero; · Where the company’s products play in the cybersecurity ecosystem; · How a small company lands partnerships with well-known, large companies; · Ways in which AI is going to impact the cybersecurity market going forward; and · How he is currently balancing the tension between achieving growth and better profitability Please find the full interview here: https://lnkd.in/gXkjuC-p
Building a Company with a Growth Mindset with Carl Herberger, CEO of Corero Network Security
https://www.youtube.com/
To view or add a comment, sign in
-
Defense in Depth: Vulnerability Management != Vulnerability Discovery Some interesting points https://lnkd.in/g3npvSZt #cyber #vulnerabilities
Vulnerability Management ≠ Vulnerability Discovery
podcasts.apple.com
To view or add a comment, sign in
-
𝐏𝐨𝐝𝐜𝐚𝐬𝐭 𝐑𝐞𝐰𝐢𝐧𝐝: 𝐀𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐝𝐨𝐧𝐞 𝐫𝐢𝐠𝐡𝐭 In episode 48, Brad Causey, CISSP and Darrius Robinson, CISSP OSCP talk about Authentication and what issues they routinely see while performing penetration tests. 𝐇𝐞𝐫𝐞 𝐚𝐫𝐞 5 𝐤𝐞𝐲 𝐭𝐚𝐤𝐞𝐚𝐰𝐚𝐲𝐬 𝐲𝐨𝐮 𝐜𝐚𝐧 𝐞𝐱𝐩𝐞𝐜𝐭 𝐟𝐫𝐨𝐦 𝐭𝐡𝐢𝐬 𝐞𝐩𝐢𝐬𝐨𝐝𝐞: 1. 𝐅𝐢𝐧𝐝 𝐨𝐮𝐭 𝐡𝐨𝐰 𝐭𝐨 𝐜𝐨𝐧𝐟𝐢𝐠𝐮𝐫𝐞 𝐲𝐨𝐮𝐫 𝐬𝐲𝐬𝐭𝐞𝐦𝐬 𝐜𝐨𝐫𝐫𝐞𝐜𝐭𝐥𝐲 and ensure proper security measures when setting up new systems. 2. 𝐄𝐱𝐩𝐥𝐨𝐫𝐞 𝐭𝐡𝐞 𝐟𝐮𝐭𝐮𝐫𝐞 𝐨𝐟 𝐚𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧 and learn about passwordless mechanisms like magic links, which can revolutionize the way we authenticate. 3. 𝐃𝐢𝐬𝐜𝐨𝐯𝐞𝐫 𝐭𝐡𝐞 𝐢𝐦𝐩𝐨𝐫𝐭𝐚𝐧𝐜𝐞 𝐨𝐟 𝐩𝐡𝐲𝐬𝐢𝐜𝐚𝐥 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐦𝐞𝐚𝐬𝐮𝐫𝐞𝐬, such as USB keys, as an additional layer of protection. 4. 𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝 𝐭𝐡𝐞 𝐜𝐨𝐧𝐜𝐞𝐩𝐭 𝐨𝐟 𝐝𝐞𝐟𝐞𝐧𝐬𝐞 𝐢𝐧 𝐝𝐞𝐩𝐭𝐡 and why it's crucial to implement multiple security measures rather than relying solely on new technologies. 5. 𝐋𝐞𝐚𝐫𝐧 𝐭𝐡𝐞 𝐛𝐞𝐬𝐭 𝐩𝐫𝐚𝐜𝐭𝐢𝐜𝐞𝐬 𝐢𝐧 𝐩𝐚𝐬𝐬𝐰𝐨𝐫𝐝 𝐦𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭, including creating strong, unique passwords and avoiding password reuse. 📺 🎧 : https://lnkd.in/eXQitMTY 𝗟𝗲𝗮𝗿𝗻 𝗺𝗼𝗿𝗲 𝗮𝗻𝗱 𝘁𝗮𝗸𝗲 𝗮𝗰𝘁𝗶𝗼𝗻: ✔️Download our "𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗜𝗻𝗶𝘁𝗶𝗮𝘁𝗶𝘃𝗲𝘀: 𝗬𝗼𝘂𝗿 𝗕𝗹𝘂𝗲𝗽𝗿𝗶𝗻𝘁 𝘁𝗼 𝗗𝗲𝗳𝗲𝗻𝘀𝗲-𝗜𝗻-𝗗𝗲𝗽𝘁𝗵" guide and enhance your security posture today - https://lnkd.in/ePpG6mXA
Episode 48: Authentication done right! - Offensive Security Blog - SecurIT360
https://offsec.blog
To view or add a comment, sign in
-
🎙️ New podcast alert! Our CIO, Carl Froggett, recently joined e92plus for their Return of the Hack podcast to discuss the challenges facing the modern-day CISO. #Cybersecurity has never been more important; learn how the role of the CISO has shifted to reflect that. https://bit.ly/3Pn1unE
Return Of The Hack
e92plus.com
To view or add a comment, sign in
-
Zero trust on the endpoint: a daring assertion or the future of security? In a recent episode of the The Roundtable Network podcast, our CEO Michael Fey joined Pam Brodt to explain how the Enterprise Browser facilitates zero trust — step by step. From validating devices to managing network flow and enforcing interaction policies, this method is transforming how organizations protect their most sensitive assets. Listen to the full discussion to delve into the mechanics of zero trust and how Island is transforming endpoint security: https://gag.gl/xVZ8GV
To view or add a comment, sign in
-
On the podcast: sage advice to CISOs and CIOs on the importance of documenting security efforts to align with DORA. https://lnkd.in/eQAUpvcE Listen to the whole podcast here: https://lnkd.in/eqpYHzt8 #DigitalOperationalResilienceAct #DORA #Cybersecurity #Compliance
The Role of CISOs Under DORA: Document Everything | Razorthorn Security
https://www.youtube.com/
To view or add a comment, sign in
-
I'm really impressed with the Schreyer Honors College podcast, Following the Gong! Sean Goheen has honed in on a great way to share Schreyer Alumni and the amazing work they are doing with everyone. Check out this episode with Atif Ghauri. Although he's not an IST alumni, the work he is doing in the Cybersecurity space is phenomenal. Definitely worth a listen (or watch)! https://lnkd.in/eXU9xXpe
FTG 0063 – From Technical Expert to Executive Leader with Cybersecurity Executive Atif Ghauri ’00
https://www.youtube.com/
To view or add a comment, sign in
-
Attack Surface Management, or ASM. Can it be fun? Maybe. Is it critical for modern security? Absolutely. If you’ve ever wondered what ASM actually does, or why it’s more than just the latest buzzword, we’ve got answers on Chaos Lever. Take a listen to the latest episode now! https://buff.ly/3YM3auC #techpodcast #asm #chaoslever
Can We Make Attack Surface Management … Fun? | Chaos Lever
pod.chaoslever.com
To view or add a comment, sign in
-
🛡️ If you're a #mssp not delivering #holistic #monitoring for your clients, here's a great #podcast from Secureworks where we discuss why it's imperative. Discover why it's your #clients best #defense in today's fast-evolving #threat landscape. 🌐💻 🎧 Tune in now and transform your #security approach: #taegis #xdr #stopthebadguys #ransomeware Bud Ellis
Holistic Monitoring: Why Now and What's the Benefit? | Let's Talk SOC Podcast | S2E18
secureworks.com
To view or add a comment, sign in
2,398 followers