Autonomous IT, Live! True Stories From the Hacker Underworld, E05
Autonomous IT29 Okt 2025

Autonomous IT, Live! True Stories From the Hacker Underworld, E05

In this episode of the Autonomous IT, host Landon Miles dives deep into the world of vulnerabilities, exploits, and the psychology behind cyberattacks. From the story of Log4j and its massive global impact to the difference between hackers and attackers, this episode explores how and why breaches happen—and what can be done to stop them.

Joining Landon is Jason Kikta, Chief Technology Officer and Chief Information Security Officer at Automox, Marine Corps veteran, and former leader at U.S. Cyber Command. Together, they break down attacker motivations, how to recognize threat patterns, and why understanding your own network better than your adversaries is the key to effective defense.

Key Takeaways:

  • The five stages of a vulnerability: introduction, discovery, disclosure, exploitation, and patching.
  • Why Log4j became one of the most devastating vulnerabilities in modern history.
  • How to identify attacker types and motivations.
  • The mindset and methodology of effective defense.
  • Why “good IT starts with good security.”

Whether you're a cybersecurity professional, IT leader, or just curious about how cyberattacks really work, this episode offers practical insights from the front lines of digital defense.

Avsnitt(207)

Hands-On IT – Making End Users Happy (and Maintaining Your Sanity), E19

Hands-On IT – Making End Users Happy (and Maintaining Your Sanity), E19

Is tech easier than people? For many IT pros, the answer is a resounding yes. In this episode, Landon Miles tackles one of IT’s biggest challenges: managing user expectations while maintaining your ow...

5 Juni 20258min

Automate IT – 5 Steps to Effectively Communicating with Your Executive Team, E13

Automate IT – 5 Steps to Effectively Communicating with Your Executive Team, E13

In this episode of the Automate IT podcast, Jeremy Maldonado discusses the importance of engaging with executive teams and the necessity of clear communication within organizations. He emphasizes the ...

3 Juni 20259min

CISO IT – RSA 2025: Identity Is the New Threat Vector, E19

CISO IT – RSA 2025: Identity Is the New Threat Vector, E19

RSA 2025 revealed a shift: identity is now a primary threat vector in cloud security. In this episode, Jason Kikta breaks down the key takeaways from the conference—why identity has overtaken malware,...

29 Maj 202511min

Product Talk – Simplified Patch Tuesday Scheduling & Beta Channel Controls, E17

Product Talk – Simplified Patch Tuesday Scheduling & Beta Channel Controls, E17

In Episode 17 of Product Talk, Peter Pflaster and Steph Rizzuto walk you through the latest enhancements in the Automox console that help you work smarter — not harder. Discover how the new Agent Conf...

27 Maj 202516min

Hands-On IT – 3 Tips to Make Your Endpoint Data Work for You, E18

Hands-On IT – 3 Tips to Make Your Endpoint Data Work for You, E18

In this episode of Hands-On IT, Landon Miles shares 3 tactical tips to help you make smarter decisions with your endpoint data. Learn how to cut through alert fatigue, streamline your reporting, and u...

22 Maj 20255min

Automox Insiders – Data Trivia and Endpoint Truths, E17

Automox Insiders – Data Trivia and Endpoint Truths, E17

In this episode of Automox Insiders, host Maddie Regis sits down with Peter Pflaster and Kelly Carlson from Automox’s product marketing team to explore how data transforms endpoint management. From me...

20 Maj 202522min

Executive IT – The Gatekeeper Myth: Why Procurement Is Your Biggest Ally, E04

Executive IT – The Gatekeeper Myth: Why Procurement Is Your Biggest Ally, E04

Procurement is no longer just a gatekeeper — it’s a strategic driver in IT and security decisions. In this episode of Executive IT, host Evan Kiely sits down with Courtney Adams, a veteran procurement...

15 Maj 202514min

Patch [FIX] Tuesday – May 2025: [Please Don’t Click That. Experts Review New Threats], E19

Patch [FIX] Tuesday – May 2025: [Please Don’t Click That. Experts Review New Threats], E19

Mayday. Mayday. May Patch Tuesday? This month’s episode dives into four key Windows vulnerabilities you need to address — from scripting engine memory corruption in legacy Internet Explorer components...

13 Maj 202511min

Populärt inom Politik & nyheter

aftonbladet-krim
motiv
blenda-2
p3-krim
rss-krimstad
fordomspodden
flashback-forever
rss-viva-fotboll
rss-sanning-konsekvens
svd-dokumentara-berattelser-2
svenska-fall
aftonbladet-daily
rss-vad-fan-hande
rss-krimreportrarna
spar
rss-frandfors-horna
rss-flodet
grans
olyckan-inifran
rss-expressen-dok