Artwork

Indhold leveret af Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Defensive Security Podcast Episode 293

48:17
 
Del
 

Manage episode 462167663 series 1344233
Indhold leveret af Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

285 episoder

Artwork
iconDel
 
Manage episode 462167663 series 1344233
Indhold leveret af Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

285 episoder

Wszystkie odcinki

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning

Lyt til dette show, mens du udforsker
Afspil