20 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده
P2P Botnets: Following the Network Trail
Manage episode 276379459 series 2792612
To increase botnet resiliency, threat actors are now using a P2P hybrid network topology that allows the botnet to survive a takedown of nodes with specialized roles, and reorganize itself accordingly. Though it can be challenging to disrupt the malicious activities of P2P botnets, you can follow proven strategies when a specific network has been affected. Listen to the podcast learn what can be done.
Here are links to the security resources mentioned during the session:
- Blog: Overcoming the Challenges of Detecting P2P Botnets on Your Network
- Webpage: Nozomi Networks Labs (Threat Advisories, Community Tools and more)
- Research Report: OT/IoT Security Report 2020 1H
- Blog: Your Guide to the MITRE ATT&CK Framework for ICS
- Webinar: How to Use the MITRE ATT&CK Framework for ICS
- Data Sheet: Threat Intelligence – Detect Emerging OT and IoT Threats and Vulnerabilities
49 قسمت
Manage episode 276379459 series 2792612
To increase botnet resiliency, threat actors are now using a P2P hybrid network topology that allows the botnet to survive a takedown of nodes with specialized roles, and reorganize itself accordingly. Though it can be challenging to disrupt the malicious activities of P2P botnets, you can follow proven strategies when a specific network has been affected. Listen to the podcast learn what can be done.
Here are links to the security resources mentioned during the session:
- Blog: Overcoming the Challenges of Detecting P2P Botnets on Your Network
- Webpage: Nozomi Networks Labs (Threat Advisories, Community Tools and more)
- Research Report: OT/IoT Security Report 2020 1H
- Blog: Your Guide to the MITRE ATT&CK Framework for ICS
- Webinar: How to Use the MITRE ATT&CK Framework for ICS
- Data Sheet: Threat Intelligence – Detect Emerging OT and IoT Threats and Vulnerabilities
49 قسمت
すべてのエピソード
×
1 The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future 29:44

1 The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence 32:31

1 A Day in the Life of an OT Responder 1:01:55

1 Cyber and Operational Resilience for Smart Factories 1:00:32

1 OT Network Security Challenges in Enterprise Environments 1:02:40

1 Monitoring & Protecting Assets in Critical Infrastructure 1:03:05

1 In a World of Unsecure IoT - Is Privacy Dead? 1:02:04

1 Understanding the Risks to Operational Technology (OT) 1:00:26

1 Defending Smart Cities from Cyber Threats 1:00:59


1 How to Build an Effective OT/IoT Cybersecurity Risk & Compliance Program 1:01:05







1 Rich Armour - Where the Rubber Hits the Road: How Digital Transformation is Creating Connected and Protected Cars 26:02


1 Fireside Chat: Accelerating Digital Transformation Drives Innovation in Industrial Cybersecurity 43:37







1 Smart Grids: Securing Encrypted Communications 1:01:53

به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.