Log4j Continues to act as Organizational Vulnerability

Log4j Continues to act as Organizational Vulnerability

Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries.

Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here.

This week on Adopting Zero Trust (AZT), we highlight a significant cybersecurity risk focused on the notorious Log4j vulnerability and the growing concern around shadow IT. Featuring expert insights from Etay Maor, the Chief Cybersecurity Strategist at Cato Networks, the conversation initially looks into the persistent exploitation methods, the importance of knowing one’s cybersecurity environment, and strategic approaches to mitigating risks.

Hosted on Acast. See acast.com/privacy for more information.

Episoder(58)

AZT: Quit Bugging the CISO + CIO

AZT: Quit Bugging the CISO + CIO

Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are formed. Catch this episode on YouTube, Apple, Spotify, Am...

8 Feb 202446min

Hacker Valley Dishes on Breaking Into Cybersecurity

Hacker Valley Dishes on Breaking Into Cybersecurity

To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role storytelling plays. A new year, a new season, and pl...

18 Jan 202449min

From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.

From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. PS, we're giving away a Flipper Zero on our site as a little season finale gift. Check out details o...

30 Nov 202356min

The Market For Enterprise (Secure) Browsers

The Market For Enterprise (Secure) Browsers

Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers.You can read the show notes here and subscribe to updates.In...

16 Nov 202346min

Beyond the Buzzword: Applicable use of AI in Cybersecurity

Beyond the Buzzword: Applicable use of AI in Cybersecurity

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term...

2 Nov 202356min

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices. Catch this episode on YouTub...

19 Okt 202354min

AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird

AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird

Season two, episode 15: We talk ZT History and API security with the godfather of Zero Trust, Dr Zero Trust, and Richard Bird.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can ...

31 Aug 202338min

Adopting Zero Trust: The Illusion of Passwordless

Adopting Zero Trust: The Illusion of Passwordless

The illusion of going passwordless with Derek Hanson, Vice President Solutions Architecture and Alliances at Yubico. You can read the show notes here. True or False: The concept of passwordless is new...

10 Aug 202351min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
tomprat-med-gunnar-tjomlid
teknisk-sett
nasjonal-sikkerhetsmyndighet-nsm
energi-og-klima
shifter
rss-ki-praten
smart-forklart
rss-impressions-2
pedagogisk-intelligens
elektropodden
rss-polypod
rss-alt-vi-kan
rss-ai-forklart
rss-teknologioptimistene-energibransjens-it-podcast
rss-for-alarmen-gar
rss-digitaliseringspadden
rss-fjorsilkebris-podcast
rss-anleggspraten