Artwork

المحتوى المقدم من Allan Alford. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Allan Alford أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

The SaaS Attacks Matrix with Luke Jennings

37:21
 
مشاركة
 

Manage episode 390583860 series 2932664
المحتوى المقدم من Allan Alford. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Allan Alford أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Howdy, y’all, and welcome to The Cyber Ranch Podcast! Our guest is Luke Jennings, VP of Research & Development at Push Security, former Chief Researcher at Countercept, Principle Security Consultant at MWR… He’s been around the industry. Luke is passionate about tracking the evolution of attacks – how are the bad guys morphing and changing their game in response to our new defenses, and more importantly, new technologies that we use in the first place. Luke, thank you so much for coming on down to the ‘Ranch!

Questions Allan asks Luke:

  1. What is the difference between traditional attacks and the new SaaS cyber kill chain?
  2. Where is the new perimeter in a fully SaaS/remote company? Is it cloud identities?
  3. What is it we’re actually protecting in a fully SaaS/remote company? The data landscape is very distributed now…
  4. You’ve mentioned that certain protective technologies are so good that they have inspired new methods of attack. This is the classic arms race metaphor. What drove the bad guys into attacking SaaS-native companies?
  5. Walk me through the modern kill chain in a SaaS-native company. I’m thinking in terms of recon, access, lateral, escalation – the old model has changed, has it not?
  6. Let's pick specific attacks from the matrix and review them

Sponsored by our good friends at Push Security.

Check then out at:

https://pushsecurity.com/ranch

  continue reading

176 حلقات

Artwork
iconمشاركة
 
Manage episode 390583860 series 2932664
المحتوى المقدم من Allan Alford. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Allan Alford أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Howdy, y’all, and welcome to The Cyber Ranch Podcast! Our guest is Luke Jennings, VP of Research & Development at Push Security, former Chief Researcher at Countercept, Principle Security Consultant at MWR… He’s been around the industry. Luke is passionate about tracking the evolution of attacks – how are the bad guys morphing and changing their game in response to our new defenses, and more importantly, new technologies that we use in the first place. Luke, thank you so much for coming on down to the ‘Ranch!

Questions Allan asks Luke:

  1. What is the difference between traditional attacks and the new SaaS cyber kill chain?
  2. Where is the new perimeter in a fully SaaS/remote company? Is it cloud identities?
  3. What is it we’re actually protecting in a fully SaaS/remote company? The data landscape is very distributed now…
  4. You’ve mentioned that certain protective technologies are so good that they have inspired new methods of attack. This is the classic arms race metaphor. What drove the bad guys into attacking SaaS-native companies?
  5. Walk me through the modern kill chain in a SaaS-native company. I’m thinking in terms of recon, access, lateral, escalation – the old model has changed, has it not?
  6. Let's pick specific attacks from the matrix and review them

Sponsored by our good friends at Push Security.

Check then out at:

https://pushsecurity.com/ranch

  continue reading

176 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع