Episode

Ep 11: Strictly Confidential
listen on Spotify
21:32
Published: Mon Jan 15 2018
Description

What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
DRATA offers continuous monitoring and visibility into risk, security controls, and audit readiness for various standards.
00:00 - 03:13 (03:13)
listen on Spotify
Cloud Compliance
Summary

DRATA offers continuous monitoring and visibility into risk, security controls, and audit readiness for various standards. They can streamline compliance for over 14 frameworks and create custom frameworks and controls to meet organizations' security needs.

Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries
The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group.
03:13 - 10:00 (06:47)
listen on Spotify
Cybersecurity
Summary

The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group. The team is hired to investigate and gather intel using their previous engagements and put some stuff in the network to look around.

Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries
The discovery of planted evidence in a certain area dates back to 2010, with the responsibility of the act remaining unknown until 2015.
10:00 - 17:38 (07:37)
listen on Spotify
Mystery
Summary

The discovery of planted evidence in a certain area dates back to 2010, with the responsibility of the act remaining unknown until 2015. The victims were shocked to learn that someone had access to their environment without their knowledge for five years.

Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries
A cybersecurity remediation process should be followed by continuous monitoring for the possible return of the threat actors.
17:38 - 21:48 (04:09)
listen on Spotify
Cybersecurity
Summary

A cybersecurity remediation process should be followed by continuous monitoring for the possible return of the threat actors. Companies should shift their thinking and start addressing the issue of intellectual property theft, as it can be just as damaging as a security breach.

Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries