Threatpost
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, threatpost, vulnerability research and trends with a variety of threatpost executives, researchers and experts. There is no question that companies are in the sights of would-be criminals looking to exploit them.
Over companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system. Tens of thousands of cameras have failed to patch a critical, month-old CVE, leaving thousands of organizations exposed. Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels. Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. So what are the trends that CISOs need to be on the lookout for? In this podcast, we dive into the edition of the State of Secrets Sprawl report with Mackenzie Jackson, developer advocate at GitGuardian. We talk issues that corporations face with public leaks from groups like Lapsus and more, as well as ways for developers to keep their code safe.
Threatpost
Threatpost editor Lindsey O'Donnell discusses security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts. The Goin' Deep Show. The Finger Guns Podcast. Motor Trade Radio. Just China. Deep Dive from The Japan Times. Zero: The Climate Race. The Engineering Leadership Podcast. Plans Features Music. Log in Sign up. The Threatpost Podcast Threatpost editor Lindsey O'Donnell discusses security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
Cybercrime increasingly threatpost mobile inthreatpost, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. SolarWinds 2. Similar podcasts.
.
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under attack. CVEs or Software vulnerabilities comprise only a part of security risks in the IT security landscape. Attack surfaces are massive with numerous security risks that must be treated equally as software vulnerabilities to reduce risk exposure and prevent cyberattacks at scale. Additionally, companies are also grappling with supply chain attacks originating through open source software using a variety of mass-market applications and operating systems. Traditional vulnerability management programs are outdated, with little to no innovation in the last two decades. Learn the growing risks in SaaS security and how different organizations are currently working to secure themselves. The dangers to SMBs and businesses of all sizes from cyberattacks are well known. The OWASP top 10 list of critical security risks will have a big impact on how businesses address application security moving forward. The changes to the list will require businesses to reevaluate their application security posture holistically. Learn more about the most significant changes that have emerged and how businesses can address them.
Threatpost
Threatpost is a long-running, independent source of news and analysis about the cybersecurity landscape, covering breaking news and threat research, malware and vulnerability analysis, long-term trends and everything in-between. This Woburn, Mass. Make Threatpost your first stop for security news and analysis to stay informed and keep your organization safe. Infosec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial. Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.
Bbc weather cyprus limassol
Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content. The show producer has not yet provided a description for this episode. Similar podcasts. View all videos. Elections Ahead of the November U. SolarWinds 2. During our conversation, we discuss: Weaknesses that attackers look to exploit Evolution of toolkits Securing MFA and more. August 19, During the course of our discussion, we dive into: What an attack on all fronts looks like The current state of the threat landscape New techniques being leveraged be adversaries The automation of threats We also lay out what CISOs need to consider when laying out and producing their threat action plan. Lydia Kostopoulos explain blockchain, NFTs and how to stay safe. Hacker-in-residence Jason Kent explains the latest. During our conversation, we discuss: Weaknesses that attackers look to exploit Evolution of toolkits Securing MFA and more. Lex Fridman Podcast.
Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments. But risks originating in personal digital lives present a challenge that enterprise security teams cannot solve, even if they wanted to. More than , of the ,plus servers hosting the open-source container-orchestration engine for managing cloud deployments allow some form of access.
Elections Ahead of the November U. So what are the trends that CISOs need to be on the lookout for? Could be that threat actors jumped on our Pavlovian work-from-home security conditioning, as suggested by Proofpoint vice president and general manager of email fraud defense Rob Holmes. They dropped by the Threatpost podcast recently to share tips on DevSecOps, including: How to build a continual testing, monitoring, and feedback processes to drive down application risk. So what are the trends that CISOs need to be on the lookout for? Note to podcasters: chose a room with carpets and soft wall surfaces. For the full report, click here. Lex Fridman Podcast. Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts. Top Podcasts In Technology.
0 thoughts on “Threatpost”