Artwork

Contenido proporcionado por Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.
Player FM : aplicación de podcast
¡Desconecta con la aplicación Player FM !

Defensive Security Podcast Episode 293

48:17
 
Compartir
 

Manage episode 462167663 series 1344233
Contenido proporcionado por Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

275 episodios

Artwork
iconCompartir
 
Manage episode 462167663 series 1344233
Contenido proporcionado por Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. Todo el contenido del podcast, incluidos episodios, gráficos y descripciones de podcast, lo carga y proporciona directamente Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat o su socio de plataforma de podcast. Si cree que alguien está utilizando su trabajo protegido por derechos de autor sin su permiso, puede seguir el proceso descrito aquí https://es.player.fm/legal.

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

275 episodios

Todos los episodios

×
 
Loading …

Bienvenido a Player FM!

Player FM está escaneando la web en busca de podcasts de alta calidad para que los disfrutes en este momento. Es la mejor aplicación de podcast y funciona en Android, iPhone y la web. Regístrate para sincronizar suscripciones a través de dispositivos.

 

Guia de referencia rapida

Escucha este programa mientras exploras
Reproducir