Secure Networks: Endace Packet Forensics Files

Secure Networks: Endace Packet Forensics Files

Podcast de Michael Morris

"Secure Networks: Endace Packet Forensics Files" features interviews with leading cybersecurity and networking experts from companies such as Cisco, D...

Empieza 30 días de prueba

Después de la prueba 4,99 € / mes.Cancela cuando quieras.

Prueba gratis

Todos los episodios

57 episodios
episode Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert artwork
Episode 59: Matt Bromiley - SANS Author and Instructor | Veteran Threat Hunting Expert

Unlock the Power of Network Packet Data in Cybersecurity In this episode of the Endace Packet Forensics Files, Michael Morris dives into the critical role of network packet data in cybersecurity with Matt Bromiley, a seasoned threat-hunting expert. Matt shares why robust detection systems and proactive threat hunting are essential, and how network data serves as the “glue” that ties together evidence in cybersecurity investigations. The challenges of managing large data volumes, the growing role of AI in threat detection, and the tools needed to stay ahead of emerging threats are explored. Matt provides practical steps to seamlessly integrate packet capture into a threat-hunting toolkit, enabling teams to uncover and respond to even the most elusive threats. Matt emphasizes the importance of implementing a comprehensive packet capture strategy and using advanced tools, including AI, to manage data and enhance detection. He also stresses the need for continuous team training to effectively interpret data and respond to real-time threats, strengthening your defense against complex threats. Don’t miss this insightful episode, where Matt shares expert tips on optimizing threat hunting and leveraging packet capture to strengthen your cybersecurity defenses.

07 nov 2024 - 38 min
episode Episode 57: Ryan Chapman - SANS Author and Instructor | Veteran DFIR Expert artwork
Episode 57: Ryan Chapman - SANS Author and Instructor | Veteran DFIR Expert

Ransomware has shifted from simple, isolated attacks to coordinated, human-operated campaigns that target entire organizations.   In this episode of the Endace Packet Forensics Files [https://www2.endace.com/secure-networks-ep54], Michael Morris talks with Ryan Chapman, SANS Instructor and expert in Digital Forensic and Incident Response (DFIR) about these evolving threats.   Ryan explains how attackers are becoming more methodical and sophisticated, focusing on disabling EDR/XDR solutions to evade detection and leaving organizations vulnerable to advanced attacks.   One of the key challenges Ryan highlights is visibility. Without robust logging, packet capture, and monitoring tools, it’s nearly impossible to understand how an attack happened fully. Even encrypted traffic can reveal critical patterns if analyzed properly.    Ryan shares examples of organizations that suffered reinfections because they rushed to restore systems without identifying the original entry point. Packet capture data plays a vital role in pinpointing when and how attackers infiltrated, ensuring a safe recovery and minimizing disruption.   As ransomware tactics evolve, adopting a Zero-Trust approach is essential. Ryan discusses how limiting permissions and avoiding overly trusting software configurations can help prevent breaches. He cites the Kaseya attack, where some organizations avoided compromise by not blindly whitelisting trusted directories. As attackers increasingly use legitimate tools, verifying all network activity and following least privilege principles are critical defenses.    Don’t miss this insightful episode, where Ryan provides actionable advice for preparing your organization against today’s ransomware threats.

26 ago 2024 - 28 min
episode Episode 55: Taran Singh - VP, Product Management at Keysight Technologies artwork
Episode 55: Taran Singh - VP, Product Management at Keysight Technologies

In this episode, I chat with Taran Singh, VP of Product Management at Keysight Technologies, about network observability.   Taran explains its importance within the zero-trust architecture and discusses the challenges organizations face in achieving clear network visibility.   He highlights the role of historical data analysis in cybersecurity and outlines Keysight's approach to network visibility.   Don’t miss this insightful discussion on network observability and its significance in modern cybersecurity.  Follow Taran here on LinkedIn  - https://www.linkedin.com/in/taransingh/ [https://www.linkedin.com/in/taransingh/]

16 may 2024 - 17 min
episode Episode 54: Jake Williams - IANS faculty member, former SANS educator, computer science and information security expert and U.S. Army veteran. artwork
Episode 54: Jake Williams - IANS faculty member, former SANS educator, computer science and information security expert and U.S. Army veteran.

In this episode of the Endace Packet Forensics Files [https://www2.endace.com/secure-networks-ep54], Michael chats with Jake Williams, aka @MalwareJake who delves into the concept of Zero Trust and its significance for organizations seeking to bolster their security defences. Discover how Zero Trust challenges traditional security models and learn about the crucial role of continuous verification and network visibility in mitigating threats. Gain valuable insights into networking fundamentals and the integration of cybersecurity principles from an industry veteran. Don't miss out on this opportunity to enhance your cybersecurity knowledge and stay ahead of evolving threats.

12 abr 2024 - 24 min
episode Episode 53: Tanya Janca - Head of Education and Community at Semgrep, Founder of WehackPurple, renowned cybersecurity expert, author and RSA Speaker. artwork
Episode 53: Tanya Janca - Head of Education and Community at Semgrep, Founder of WehackPurple, renowned cybersecurity expert, author and RSA Speaker.

In this episode of Secure Networks, Michael chats with Tanya Janka, aka SheHacksPurple, head of education and community at Semgrep and founder of We Hack Purple. Tanya discusses her transition from developer to security expert, the real issues behind the cybersecurity skills gap, and strategies for employee retention. She also dives into the implications of emerging technologies on security practices and the balance between automation and human expertise. Don’t miss these valuable insights. Visit Tanya's websites:  ► We Hack Purple - [https://wehackpurple.com/]  ► Semgrep - [https://semgrep.dev/]

29 feb 2024 - 42 min
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
MI TOC es feliz, que maravilla. Ordenador, limpio, sugerencias de categorías nuevas a explorar!!!
Me suscribi con los 14 días de prueba para escuchar el Podcast de Misterios Cotidianos, pero al final me quedo mas tiempo porque hacia tiempo que no me reía tanto. Tiene Podcast muy buenos y la aplicación funciona bien.
App ligera, eficiente, encuentras rápido tus podcast favoritos. Diseño sencillo y bonito. me gustó.
contenidos frescos e inteligentes
La App va francamente bien y el precio me parece muy justo para pagar a gente que nos da horas y horas de contenido. Espero poder seguir usándola asiduamente.

Disponible en todas partes

¡Escucha Podimo en tu móvil, tablet, ordenador o coche!

Un universo de entretenimiento en audio

Miles de podcast y audiolibros exclusivos

Sin anuncios

No pierdas tiempo escuchando anuncios cuando escuches los contenidos de Podimo.

Empieza 30 días de prueba

Después de la prueba 4,99 € / mes.Cancela cuando quieras.

Podcasts exclusivos

Sin anuncios

Podcasts que no pertenecen a Podimo

Audiolibros

20 horas / mes

Prueba gratis

Otros podcasts exclusivos

Audiolibros populares