Artwork

Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

"I'm going to breach you off." "Not if I breach you off first!"

56:47
 
Share
 

Manage episode 375114819 series 1443139
Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We know we're like two weeks late to the Barbie party, but the whole Beers with Talos crew has seen it now so we had to talk about it. Expect a lot of "Barbie" talk up at the top. After that, though, we dive into how to set up deception systems and establish your environment to make it harder for an intruder to get in. The goal here is to make it so that attackers have to waste time and resources trying to get in but ultimately come away empty-handed. We talk about why this is important for the systems we build and why the security community doesn't talk enough about this approach.

  continue reading

145 episodes

Artwork
iconShare
 
Manage episode 375114819 series 1443139
Content provided by Cisco Talos. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cisco Talos or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

We know we're like two weeks late to the Barbie party, but the whole Beers with Talos crew has seen it now so we had to talk about it. Expect a lot of "Barbie" talk up at the top. After that, though, we dive into how to set up deception systems and establish your environment to make it harder for an intruder to get in. The goal here is to make it so that attackers have to waste time and resources trying to get in but ultimately come away empty-handed. We talk about why this is important for the systems we build and why the security community doesn't talk enough about this approach.

  continue reading

145 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide