goodlisten

Chapter

Tips and Tricks on How to Approach Cybersecurity Attacks
listen on Spotify
12:25 - 21:03 (08:37)

A cybersecurity expert shares his insights on how to approach cybersecurity attacks by observing the environment and understanding what's going around before deciding on the best course of action. Known vulnerabilities and IT team best practices are just some of the low-hanging fruit that hackers often take advantage of.

Clips
A good penetration tester leverages low-hanging fruits, known vulnerabilities, and basic enumeration without being loud to avoid raising suspicion and gather insights on systems' normal patterns.
12:25 - 15:24 (02:59)
listen on Spotify
Penetration Testing
Summary

A good penetration tester leverages low-hanging fruits, known vulnerabilities, and basic enumeration without being loud to avoid raising suspicion and gather insights on systems' normal patterns.

Chapter
Tips and Tricks on How to Approach Cybersecurity Attacks
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
DRADA is a cloud compliance software that streamlines compliance for over 14 frameworks, like SOC 2, ISO 27001, GDPR, HIPAA, and more, while allowing automation of custom frameworks and controls.
15:24 - 19:03 (03:38)
listen on Spotify
DRADA
Summary

DRADA is a cloud compliance software that streamlines compliance for over 14 frameworks, like SOC 2, ISO 27001, GDPR, HIPAA, and more, while allowing automation of custom frameworks and controls. Brave browser users can take advantage of advanced features, like WebUSB, while protecting their privacy.

Chapter
Tips and Tricks on How to Approach Cybersecurity Attacks
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries
The podcast discusses network access control (NAC) and the benefits it can provide when managing assets and controlling network access.
19:03 - 21:03 (01:59)
listen on Spotify
Network Access Control
Summary

The podcast discusses network access control (NAC) and the benefits it can provide when managing assets and controlling network access. The guest also talks about using active reconnaissance to collect data and plan possible attacks.

Chapter
Tips and Tricks on How to Approach Cybersecurity Attacks
Episode
Ep 36: Jeremy from Marketing
Podcast
Darknet Diaries