28 subscribers
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights
Manage episode 447839030 series 2800269
What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and also too aware of? Plus some thoughts on cybersecurity awareness training and how we can do better.
This is a great conversation facilitated by SURGe's Mick Baccio, with Joe Marshall and Nick Biasini from Talos, and Tamara Chacon and Audra Streetman from SURGe.
Catch up on all the latest and greatest threat research from our friends at SURGe at https://www.splunk.com/en_us/surge.html
207 حلقات
Manage episode 447839030 series 2800269
What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and also too aware of? Plus some thoughts on cybersecurity awareness training and how we can do better.
This is a great conversation facilitated by SURGe's Mick Baccio, with Joe Marshall and Nick Biasini from Talos, and Tamara Chacon and Audra Streetman from SURGe.
Catch up on all the latest and greatest threat research from our friends at SURGe at https://www.splunk.com/en_us/surge.html
207 حلقات
كل الحلقات
×
1 A blueprint for protecting major events 13:43

1 Why attackers are using hidden text salting to evade email filters 9:59

1 How to establish a threat intelligence program (Cisco Live EMEA preview) 16:01

1 Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024 13:59

1 It's the 35th anniversary of ransomware - let's talk about the major shifts and changes 23:28

1 Unwrapping the emerging Interlock ransomware attack 15:02

1 It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights 50:38

1 The biggest takeaways from Talos IR's new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing 15:26

1 How Talos IR and Splunk are teaming up 21:21

1 Why the BlackByte ransomware group may be more active than we initially thought 9:21

1 AI, critical infrastructure dominate conversation at Hacker Summer Camp 14:07

1 A 1-on-1 with Talos VP Matt Watchinski 30:04

1 What should we be doing to better support open-source software? 11:03

1 Threat actor trends and the most prevalent malware from the past quarter 15:57
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.