Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
תוכן מסופק על ידי IT Pro. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי IT Pro או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !
התחל במצב לא מקוון עם האפליקציה Player FM !
Cracking open insider threats
MP3•בית הפרקים
Manage episode 439653547 series 2569287
תוכן מסופק על ידי IT Pro. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי IT Pro או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Cybersecurity teams face a constant battle of ensuring their company is shored up in the right places. Facing down increasingly sophisticated and persistent threat actors, there’s every reason to focus on one’s perimeter to shield oneself against external threats.
But insider threats – attacks carried out from within an organization’s environment – must also be part of any business’s security strategy. When the call is coming from inside the house, either via a hacker who’s secretly gained access or in the form of a disgruntled employee, security teams need to be ready to clamp down hard.
In this episode, Jane and Rory welcome back Ross Kelly, ITPro’s news and analysis editor, to discuss the scale of these insider threats.
Read more:
…
continue reading
But insider threats – attacks carried out from within an organization’s environment – must also be part of any business’s security strategy. When the call is coming from inside the house, either via a hacker who’s secretly gained access or in the form of a disgruntled employee, security teams need to be ready to clamp down hard.
In this episode, Jane and Rory welcome back Ross Kelly, ITPro’s news and analysis editor, to discuss the scale of these insider threats.
Read more:
- Why you should always be wary of insider threats
- North Korean insider attacks are skyrocketing – dozens of US firms didn't spot the hacker in their midst
- Cyber firm KnowBe4 unknowingly hired a North Korean hacker – and it went exactly as you might think
- Should your business worry about North Korean cyber attacks?
- State-sponsored cyber attacks: The new frontier
- The Verizon data breach that exposed 63,000 employees is a reminder of how a simple mistake can have costly implications
- Preventing deepfake attacks: How businesses can stay protected
- How Intel's FakeCatcher hopes to eradicate real-time deepfakes
- AI threats: The importance of a concrete strategy in fighting novel attacks
- Why I think the Scarlett Johansson OpenAI scandal shows the danger of AI-generated voice content
272 פרקים
MP3•בית הפרקים
Manage episode 439653547 series 2569287
תוכן מסופק על ידי IT Pro. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי IT Pro או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Cybersecurity teams face a constant battle of ensuring their company is shored up in the right places. Facing down increasingly sophisticated and persistent threat actors, there’s every reason to focus on one’s perimeter to shield oneself against external threats.
But insider threats – attacks carried out from within an organization’s environment – must also be part of any business’s security strategy. When the call is coming from inside the house, either via a hacker who’s secretly gained access or in the form of a disgruntled employee, security teams need to be ready to clamp down hard.
In this episode, Jane and Rory welcome back Ross Kelly, ITPro’s news and analysis editor, to discuss the scale of these insider threats.
Read more:
…
continue reading
But insider threats – attacks carried out from within an organization’s environment – must also be part of any business’s security strategy. When the call is coming from inside the house, either via a hacker who’s secretly gained access or in the form of a disgruntled employee, security teams need to be ready to clamp down hard.
In this episode, Jane and Rory welcome back Ross Kelly, ITPro’s news and analysis editor, to discuss the scale of these insider threats.
Read more:
- Why you should always be wary of insider threats
- North Korean insider attacks are skyrocketing – dozens of US firms didn't spot the hacker in their midst
- Cyber firm KnowBe4 unknowingly hired a North Korean hacker – and it went exactly as you might think
- Should your business worry about North Korean cyber attacks?
- State-sponsored cyber attacks: The new frontier
- The Verizon data breach that exposed 63,000 employees is a reminder of how a simple mistake can have costly implications
- Preventing deepfake attacks: How businesses can stay protected
- How Intel's FakeCatcher hopes to eradicate real-time deepfakes
- AI threats: The importance of a concrete strategy in fighting novel attacks
- Why I think the Scarlett Johansson OpenAI scandal shows the danger of AI-generated voice content
272 פרקים
모든 에피소드
×ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.