Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
The Threatpost Podcast - Inside the Hackers’ Toolkit

Inside the Hackers’ Toolkit

08/09/22 • 16 min

1 Listener

The Threatpost Podcast

There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element.

In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries.

During our conversation, we discuss:

  • Weaknesses that attackers look to exploit
  • Evolution of toolkits
  • Securing MFA and more
plus icon
bookmark

There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element.

In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries.

During our conversation, we discuss:

  • Weaknesses that attackers look to exploit
  • Evolution of toolkits
  • Securing MFA and more

Previous Episode

undefined - Being prepared for adversarial attacks

Being prepared for adversarial attacks

There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for?

For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist & VP Global Threat Intelligence, Fortinet’s FortiGuard Labs to discuss the threats facing CISOs along with more.

During the course of our discussion, we dive into:

  • What an attack on all fronts looks like
  • The current state of the threat landscape
  • New techniques being leveraged be adversaries
  • The automation of threats

We also lay out what CISOs need to consider when laying out and producing their threat action plan.

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/the-threatpost-podcast-108737/inside-the-hackers-toolkit-23110761"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to inside the hackers’ toolkit on goodpods" style="width: 225px" /> </a>

Copy