37 min

Controls vs. Redundancy Secure Connections

    • Technology

Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the MSP to get around detection tools, where controls like Zero Trust and MFA can prevent these attacks and ultimate breach.

Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the MSP to get around detection tools, where controls like Zero Trust and MFA can prevent these attacks and ultimate breach.

37 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
Deep Questions with Cal Newport
Cal Newport
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
Darknet Diaries
Jack Rhysider