Artwork

Content provided by Plymouth University. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Plymouth University or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How Companies Get Compromised

 
Share
 

Archived series ("Inactive feed" status)

When? This feed was archived on June 24, 2018 13:54 (6y ago). Last successful fetch was on April 13, 2018 08:41 (6+ y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 101120850 series 84724
Content provided by Plymouth University. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Plymouth University or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Recent years show a drastic advancement of attacks on companies. Attacks on systems connected to the Internet are standard and are automated to a high degree. Thomas Hackner presents a practical demonstration on how attackers from the Internet can compromise an internal system and use it toadvance in the network until domain administrator rights are achieved. The session was part of Secure South West 4, which was held at Plymouth University on 10 July 2014. [(CC) BY-NC-SA 2.0 UK]
  continue reading

187 episodes

Artwork

How Companies Get Compromised

Networks & Security

170 subscribers

published

iconShare
 

Archived series ("Inactive feed" status)

When? This feed was archived on June 24, 2018 13:54 (6y ago). Last successful fetch was on April 13, 2018 08:41 (6+ y ago)

Why? Inactive feed status. Our servers were unable to retrieve a valid podcast feed for a sustained period.

What now? You might be able to find a more up-to-date version using the search function. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 101120850 series 84724
Content provided by Plymouth University. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Plymouth University or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Recent years show a drastic advancement of attacks on companies. Attacks on systems connected to the Internet are standard and are automated to a high degree. Thomas Hackner presents a practical demonstration on how attackers from the Internet can compromise an internal system and use it toadvance in the network until domain administrator rights are achieved. The session was part of Secure South West 4, which was held at Plymouth University on 10 July 2014. [(CC) BY-NC-SA 2.0 UK]
  continue reading

187 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide