Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Defensive Security Podcast Episode 293

48:17
 
Share
 

Manage episode 462167663 series 1344233
Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

285 episodes

Artwork
iconShare
 
Manage episode 462167663 series 1344233
Content provided by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jerry Bell and Andrew Kalat, Jerry Bell, and Andrew Kalat or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

“Another day, another data breach.”

In this episode of the Defensive Security Podcast, Jerry Bell and Andrew Kalat discuss a significant data breach affecting hotel reservation data, regulatory actions taken against GoDaddy for poor security practices, and the evolving landscape of cyber attacks. They emphasize the importance of proactive defense strategies and innovative detection techniques to combat these threats effectively.

Takeaways

  • Data breaches continue to be a common occurrence in the cybersecurity landscape.
    Regulatory bodies like the FTC are increasingly involved in enforcing security improvements post-breach.
  • Organizations must prioritize security measures to protect sensitive data from breaches.
  • The importance of multi-factor authentication cannot be overstated in preventing credential theft.
  • Ad blockers are not just for user convenience; they are essential for security.
  • Cybersecurity is a shared responsibility across all departments, including marketing and IT.
  • Proactive detection strategies can help identify malicious activity before significant damage occurs.
  • Understanding the attack vectors used by cybercriminals is crucial for effective defense.
  • Regularly updating and patching systems is vital to prevent exploitation of known vulnerabilities.
  • Innovative detection techniques, such as canary accounts, can enhance security monitoring efforts.

Links:

  • https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/
  • https://www.bleepingcomputer.com/news/security/ftc-orders-godaddy-to-fix-poor-web-hosting-security-practices/
  • https://www.bleepingcomputer.com/news/security/hackers-leak-configs-and-vpn-credentials-for-15-000-fortigate-devices/
  • https://cybersecuritynews.com/hackers-exploiting-companies-google-ads-accounts/
  • https://www.blackhillsinfosec.com/one-active-directory-account-can-be-your-best-early-warning/

  continue reading

285 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play