Artwork

محتوای ارائه شده توسط Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !
icon Daily Deals

Defensive Security Podcast Episode 293

48:17
 
اشتراک گذاری
 

Manage episode 462167663 series 1344233
محتوای ارائه شده توسط Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

290 قسمت

Artwork
iconاشتراک گذاری
 
Manage episode 462167663 series 1344233
محتوای ارائه شده توسط Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

290 قسمت

Minden epizód

×
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش