התחל במצב לא מקוון עם האפליקציה Player FM !
Solving Hidden SecOps Vulnerabilities with Network Discovery
Manage episode 333681039 series 2683101
The SecOps benefits from device visibility is limited if that data is incomplete. Depending on DHCP alone can leave gaps in missed devices and partial data. Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore.
This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert on networking technologies. As we investigate ‘discovery’ technologies, we’ll look at some additional security benefits they can provide in a world where any vulnerability can be exploited with devastating results.
Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
78 פרקים
Manage episode 333681039 series 2683101
The SecOps benefits from device visibility is limited if that data is incomplete. Depending on DHCP alone can leave gaps in missed devices and partial data. Rogue DHCP, rogue devices, and more present risks that SecOps cannot ignore.
This episode of threat talk will focus on how to fill in these gaps with the help of Bob Rose, our resident expert on networking technologies. As we investigate ‘discovery’ technologies, we’ll look at some additional security benefits they can provide in a world where any vulnerability can be exploited with devastating results.
Tune in to the live broadcast on LinkedIn and Facebook every first and third Tuesday of the month at 11:00 am (PST). Subscribe to the ThreatTalk podcast on Apple Podcasts, Spotify, SoundCloud, or Stitcher.
78 פרקים
כל הפרקים
×
1 The Good, the Bad, and the Cybersecurity AI to Sort It All Out 30:30

1 Meet the Authors: Abusing DNS as Transport 28:53

1 Breaking Down Domain Takedown Services 34:19

1 Meet the Authors: Countering Redirection and Misdirection with DNS 30:33

1 Outsourcing Teaming, Testing, and Trust with Third Parties 22:49

1 Meet the Authors: DNS Insecurity, or DNS in Security? 29:01

1 Overkill or ‘Just Right’? The Cybersecurity Role of Service Providers 29:20

1 The Care and Feeding of an Effective Threat Intelligence System 30:48

1 Security Outsourcing: Why, When and How to Make it Work 23:34

1 The community has spoken: Top Topics of Q2’ 23 29:41

1 Center Stage: Persistent Infrastructure Threat Actors 29:47

1 Meet the Author: Bill Brenner on the 2023 Global State of Cybersecurity Study 30:09


1 Get FREE 3rd Party Help to Combat Your Cybersecurity Skill Shortage 28:09

1 Show Me the Value: Understanding the Security Channel Landscape 21:37
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.