100 episodes

Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.

The Threatpost Podcast Mike Mimoso, Chris Brook

    • Technology
    • 4.1 • 23 Ratings

Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.

    Inside the Hackers’ Toolkit

    Inside the Hackers’ Toolkit

    There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element. In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries. During our conversation, we discuss: Weaknesses that attackers look to exploit Evolution of toolkits Securing MFA and more

    • 16 min
    Being prepared for adversarial attacks

    Being prepared for adversarial attacks

    There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist & VP Global Threat Intelligence, Fortinet’s FortiGuard Labs to discuss the threats facing CISOs along with more. During the course of our discussion, we dive into: What an attack on all fronts looks like The current state of the threat landscape New techniques being leveraged be adversaries The automation of threats We also lay out what CISOs need to consider when laying out and producing their threat action plan.

    • 22 min
    The State of Secrets Sprawl

    The State of Secrets Sprawl

    Can I tell you a secret? Will you keep it between us? You’ve probably said this or heard this when it comes to friends and family. However, do you also know that secret keeping, or lack thereof is one of the biggest issues that businesses face? According to the recent The State of the Secret Sprawl from GitGuardian further defines the breadth of business secrets. “A secret can be any sensitive data that we want to keep private. When discussing secrets in the context of software development, secrets generally refer to digital authentication credentials that grant access to services, systems and data. These are most commonly API keys, usernames and passwords, or security certificates. Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. Secrets grant access to the most sensitive systems.” In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, along with as ways that developers can keep their code safe. For the full report, click here.

    • 16 min
    The Truth Behind ‘Mythical’ MacOS Malware – Podcast

    The Truth Behind ‘Mythical’ MacOS Malware – Podcast

    Huntress Labs R&D Director Jamie Levy busts the old “Macs don’t get viruses” myth and offers tips on how MacOS malware differs and how to protect against it.

    • 18 min
    A Blockchain Primer and a Bored Ape Headscratcher – Podcast

    A Blockchain Primer and a Bored Ape Headscratcher – Podcast

    Still mystified by it all? Listen to KnowBe4’s Dr. Lydia Kostopoulos explain what blockchain is: Now’s the time to learn about associated cybersecurity risks.

    • 27 min
    Cyberattackers Put the Pedal to the Metal – Podcast

    Cyberattackers Put the Pedal to the Metal – Podcast

    The automation and speed of attacks are increasing, says Fortinet's Derek Manky. Cases in point: Log4J and Linux as a new fav target.

    • 18 min

Customer Reviews

4.1 out of 5
23 Ratings

23 Ratings

Uncleduke911 ,

Threatpost

Note to podcasters: chose a room with carpets and soft wall surfaces. Use a quality unidirectional mic. Sit closer to mic. Otherwise it’s too fatiguing to listen to your fine podcast.

5G program continues to demonstrate producer indifference to poor audio quality.

Jodaso ,

Say ‘ya know’ one more time

...I can’t take it. Deleting this from my feed

obacker19 ,

Empowering, insightful and actionable! 👏👏👏

Whether you’re well established as a cyber security innovator, or just getting started carving out your role as a change agent within your organization - this is a must-listen podcast for you! Lindsey and the Threatpost team do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of navigating an ever changing data security and compliance environment - with actual leaders in the field. Highly recommend listening and subscribing!

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Conviction | Pod People
Acquired
Ben Gilbert and David Rosenthal
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod
Hard Fork
The New York Times

You Might Also Like