Chapter
Security Best Practices can be Negated by Social Media
A hacker was able to bypass the front door network firewall by discovering an engineer with LinkedIn admin access, finding their personal website, and using that as a backdoor to gain entry into the company's network. This highlights the dangers of posting sensitive information on social media platforms like LinkedIn.
Clips
DRATA provides continuous monitoring and visibility into risk, security controls, and audit readiness for compliance frameworks like SOC 2, ISO 27001, GDPR, and HIPAA.
01:20 - 03:57 (02:37)
Summary
DRATA provides continuous monitoring and visibility into risk, security controls, and audit readiness for compliance frameworks like SOC 2, ISO 27001, GDPR, and HIPAA. It can streamline compliance for over 14 frameworks and even automate custom frameworks and controls.
ChapterSecurity Best Practices can be Negated by Social Media
Episode86: The LinkedIn Incident
PodcastDarknet Diaries
A hacker was able to infiltrate LinkedIn's network by tracing an engineer's personal website from their LinkedIn profile, leading to concerns around the risks of posting personal information online.
03:57 - 06:37 (02:39)
Summary
A hacker was able to infiltrate LinkedIn's network by tracing an engineer's personal website from their LinkedIn profile, leading to concerns around the risks of posting personal information online.