Artwork

Nội dung được cung cấp bởi Infosec. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Infosec hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Player FM - Ứng dụng Podcast
Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !

Why is Log4J still so successful? | Guest Etay Maor

57:57
 
Chia sẻ
 

Manage episode 427896461 series 3076553
Nội dung được cung cấp bởi Infosec. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Infosec hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.

Today on Cyber Work, I talked with Etay Maor, Chief Security Strategist with Cato Networks. Etay is a founding member of the Cato Cyber Threats Research Lab, or CTRL — see what they did there? — and he joins me to talk about their first CTRL report on attack patterns and methods. We’re going to talk about the most common attack vectors, why Log4J still rules the roost even against newer and flashier exploits, and we go deep into the many paths you can take to become a threat researcher, threat analyst, reverse engineer, and lots more. That’s all on today’s episode of Cyber Work!
0:00 - Intro
4:10 - First interest in cybersecurity and tech
5:15 - Becoming chief security strategist
8:15 - Working in cybersecurity project management
12:07 - Hacker targets and AI
15:04 - The dark web and security access
16:03 - The CTRL report in brief
20:23 - Health care cybersecurity
22:49 - Different cyberattacks in different industries
25:10 - Using security tools as a gateway
27:03 - AI-enabled cyberattacks
33:14 - Careers as a cybersecurity threat researcher
36:09 - Figuring out where to specialize in cybersecurity
41:31 - Important cybersecurity skills and experience
45:58 - Hiring in cybersecurity
49:30 - Future changes in AI and cyber tools
55:38 - What is Cato Networks?
57:13 - Outro
– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
About Infosec
Infosec’s mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ’s security awareness training. Learn more at infosecinstitute.com.

  continue reading

Chương

1. Introduction to Cybersecurity Immersive Boot Camps (00:00:00)

2. Navigating Career Paths in Cybersecurity (00:05:42)

3. Cyber Threat Research and Findings (00:12:30)

4. Emerging Attack Trends in Cybersecurity (00:22:31)

5. Navigating Cybersecurity Career Paths (00:30:32)

6. Leveraging Resources for Cybersecurity Success (00:37:19)

7. Cybersecurity Job Seeker Qualifications (00:42:46)

8. Predicting Future Trends in Cybersecurity (00:48:19)

9. Building a Cybersecurity Career Path (00:52:07)

10. Closing Remarks and Thank You (00:58:23)

359 tập

Artwork
iconChia sẻ
 
Manage episode 427896461 series 3076553
Nội dung được cung cấp bởi Infosec. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Infosec hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.

Today on Cyber Work, I talked with Etay Maor, Chief Security Strategist with Cato Networks. Etay is a founding member of the Cato Cyber Threats Research Lab, or CTRL — see what they did there? — and he joins me to talk about their first CTRL report on attack patterns and methods. We’re going to talk about the most common attack vectors, why Log4J still rules the roost even against newer and flashier exploits, and we go deep into the many paths you can take to become a threat researcher, threat analyst, reverse engineer, and lots more. That’s all on today’s episode of Cyber Work!
0:00 - Intro
4:10 - First interest in cybersecurity and tech
5:15 - Becoming chief security strategist
8:15 - Working in cybersecurity project management
12:07 - Hacker targets and AI
15:04 - The dark web and security access
16:03 - The CTRL report in brief
20:23 - Health care cybersecurity
22:49 - Different cyberattacks in different industries
25:10 - Using security tools as a gateway
27:03 - AI-enabled cyberattacks
33:14 - Careers as a cybersecurity threat researcher
36:09 - Figuring out where to specialize in cybersecurity
41:31 - Important cybersecurity skills and experience
45:58 - Hiring in cybersecurity
49:30 - Future changes in AI and cyber tools
55:38 - What is Cato Networks?
57:13 - Outro
– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free
– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast
About Infosec
Infosec’s mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ’s security awareness training. Learn more at infosecinstitute.com.

  continue reading

Chương

1. Introduction to Cybersecurity Immersive Boot Camps (00:00:00)

2. Navigating Career Paths in Cybersecurity (00:05:42)

3. Cyber Threat Research and Findings (00:12:30)

4. Emerging Attack Trends in Cybersecurity (00:22:31)

5. Navigating Cybersecurity Career Paths (00:30:32)

6. Leveraging Resources for Cybersecurity Success (00:37:19)

7. Cybersecurity Job Seeker Qualifications (00:42:46)

8. Predicting Future Trends in Cybersecurity (00:48:19)

9. Building a Cybersecurity Career Path (00:52:07)

10. Closing Remarks and Thank You (00:58:23)

359 tập

All episodes

×
 
Loading …

Chào mừng bạn đến với Player FM!

Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.

 

Hướng dẫn sử dụng nhanh