Episode
Ep 11: Strictly Confidential
Description
What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Chapters
DRATA offers continuous monitoring and visibility into risk, security controls, and audit readiness for various standards.
00:00 - 03:13 (03:13)
Summary
DRATA offers continuous monitoring and visibility into risk, security controls, and audit readiness for various standards. They can streamline compliance for over 14 frameworks and create custom frameworks and controls to meet organizations' security needs.
EpisodeEp 11: Strictly Confidential
PodcastDarknet Diaries
The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group.
03:13 - 10:00 (06:47)
Summary
The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group. The team is hired to investigate and gather intel using their previous engagements and put some stuff in the network to look around.
EpisodeEp 11: Strictly Confidential
PodcastDarknet Diaries
The discovery of planted evidence in a certain area dates back to 2010, with the responsibility of the act remaining unknown until 2015.
10:00 - 17:38 (07:37)
Summary
The discovery of planted evidence in a certain area dates back to 2010, with the responsibility of the act remaining unknown until 2015. The victims were shocked to learn that someone had access to their environment without their knowledge for five years.
EpisodeEp 11: Strictly Confidential
PodcastDarknet Diaries
A cybersecurity remediation process should be followed by continuous monitoring for the possible return of the threat actors.
17:38 - 21:48 (04:09)
Summary
A cybersecurity remediation process should be followed by continuous monitoring for the possible return of the threat actors. Companies should shift their thinking and start addressing the issue of intellectual property theft, as it can be just as damaging as a security breach.