The Threatpost Podcast

Mike Mimoso, Chris Brook

The Information Security Podcast

  • 16 minutes 1 second
    Inside the Hackers’ Toolkit

    There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element.

    In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries.

    During our conversation, we discuss:

    • Weaknesses that attackers look to exploit
    • Evolution of toolkits
    • Securing MFA and more
    9 August 2022, 2:46 pm
  • 22 minutes 10 seconds
    Being prepared for adversarial attacks

    There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for?

    For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist & VP Global Threat Intelligence, Fortinet’s FortiGuard Labs to discuss the threats facing CISOs along with more.

    During the course of our discussion, we dive into:

    • What an attack on all fronts looks like
    • The current state of the threat landscape
    • New techniques being leveraged be adversaries
    • The automation of threats

    We also lay out what CISOs need to consider when laying out and producing their threat action plan.

    2 June 2022, 9:29 am
  • 16 minutes 50 seconds
    The State of Secrets Sprawl

    Can I tell you a secret? Will you keep it between us?

    You’ve probably said this or heard this when it comes to friends and family. However, do you also know that secret keeping, or lack thereof is one of the biggest issues that businesses face?

    According to the recent The State of the Secret Sprawl from GitGuardian further defines the breadth of business secrets.

    “A secret can be any sensitive data that we want to keep private. When discussing secrets in the context of software development, secrets generally refer to digital authentication credentials that grant access to services, systems and data. These are most commonly API keys, usernames and passwords, or security certificates. Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. Secrets grant access to the most sensitive systems.”

    In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, along with as ways that developers can keep their code safe.

    For the full report, click here.

    6 May 2022, 1:42 pm
  • 18 minutes 53 seconds
    The Truth Behind ‘Mythical’ MacOS Malware – Podcast
    Huntress Labs R&D Director Jamie Levy busts the old “Macs don’t get viruses” myth and offers tips on how MacOS malware differs and how to protect against it.
    31 March 2022, 7:53 pm
  • 27 minutes 33 seconds
    A Blockchain Primer and a Bored Ape Headscratcher – Podcast
    Still mystified by it all? Listen to KnowBe4’s Dr. Lydia Kostopoulos explain what blockchain is: Now’s the time to learn about associated cybersecurity risks.
    31 March 2022, 1:48 am
  • 18 minutes 51 seconds
    Cyberattackers Put the Pedal to the Metal – Podcast
    The automation and speed of attacks are increasing, says Fortinet's Derek Manky. Cases in point: Log4J and Linux as a new fav target.
    28 March 2022, 7:48 pm
  • 21 minutes 40 seconds
    Top 3 Attack Trends in API Security – Podcast
    Bots & automated attacks have exploded, with attackers and developers alike in love with APIs, according to a new Cequence Security report. Hacker-in-residence Jason Kent explains the latest.
    23 March 2022, 7:48 pm
  • 24 minutes 20 seconds
    Reporting Mandates to Clear Up Feds' Hazy Look into Threat Landscape – Podcast

    It’s about time, AttackIQ’s Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill: Visibility into adversary behavior has been muck.

    16 March 2022, 9:08 pm
  • 39 minutes 53 seconds
    Staff Think Conti Group Is a Legit Employer – Podcast

    The ransomware group’s benefits – monthly bonuses, fines, employee of the month, performance reviews and top-notch training materials – might be better than your own company’s, says BreachQuest’s Marco Figueroa. 

    14 March 2022, 9:15 pm
  • 28 minutes 50 seconds
    Multi-Ransomwared Victims Have It Coming

    There's a yawning gap between IT decision makers' confidence about security vs. their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.

    8 March 2022, 12:06 am
  • 17 minutes 42 seconds
    Russia Leaks Data From a Thousand Cuts–Podcast

    It’s not just Ukraine: Threat intel experts are seeing a flood of data on Russian military, nukes and crooks, even with the Conti ransomware gang having shuttered its leaking Jabber chat server. 

    3 March 2022, 4:11 pm
  • More Episodes? Get the App
© MoonFM 2024. All rights reserved.