Chapter

Security Best Practices can be Negated by Social Media
listen on Spotify
01:20 - 06:37 (05:17)

A hacker was able to bypass the front door network firewall by discovering an engineer with LinkedIn admin access, finding their personal website, and using that as a backdoor to gain entry into the company's network. This highlights the dangers of posting sensitive information on social media platforms like LinkedIn.

Clips
DRATA provides continuous monitoring and visibility into risk, security controls, and audit readiness for compliance frameworks like SOC 2, ISO 27001, GDPR, and HIPAA.
01:20 - 03:57 (02:37)
listen on Spotify
Compliance
Summary

DRATA provides continuous monitoring and visibility into risk, security controls, and audit readiness for compliance frameworks like SOC 2, ISO 27001, GDPR, and HIPAA. It can streamline compliance for over 14 frameworks and even automate custom frameworks and controls.

Chapter
Security Best Practices can be Negated by Social Media
Episode
86: The LinkedIn Incident
Podcast
Darknet Diaries
A hacker was able to infiltrate LinkedIn's network by tracing an engineer's personal website from their LinkedIn profile, leading to concerns around the risks of posting personal information online.
03:57 - 06:37 (02:39)
listen on Spotify
Cybersecurity
Summary

A hacker was able to infiltrate LinkedIn's network by tracing an engineer's personal website from their LinkedIn profile, leading to concerns around the risks of posting personal information online.

Chapter
Security Best Practices can be Negated by Social Media
Episode
86: The LinkedIn Incident
Podcast
Darknet Diaries