Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

#ThreatDigest: Stop Making These Initial Access Mistakes

#ThreatDigest: Stop Making These Initial Access Mistakes

FromProtecting People


#ThreatDigest: Stop Making These Initial Access Mistakes

FromProtecting People

ratings:
Length:
28 minutes
Released:
Sep 22, 2021
Format:
Podcast episode

Description

Gone are the days of 2016 when we saw 12 million ransomware attachments randomly blasted out per day. It’s 2021 now, when threat actors selectively deploy ransomware against high value targets across the victim organization’s entire network in order to secure initial access.

Why is initial access so often overlooked in protecting against the multiplicity of ransomware threats?

In the inaugural episode of our Threat Digest series, series hosts Selena Larson and Crista Giering, Senior Threat Intelligence Analysts at Proofpoint, interview Daniel Blackford, Senior Threat Researcher at Proofpoint, about initial access and what can happen afterwards. 

Join us as we discuss:

The evolution of ecrime in the past five years
Initial access, dwell time, and the prevalence of Cobalt Strike activity
What white glove ransomware treatment is like
Tips for protecting your org against multiple malign actors at various stages of an attack


Check out the report we mentioned during the podcast:
-The First Step: Initial Access Leads to Ransomware  

For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.

Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.
Released:
Sep 22, 2021
Format:
Podcast episode

Titles in the series (100)

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.