Hosted on Acast. See acast.com/privacy for more information.
Hosted on Acast. See acast.com/privacy for more information.

Episode 3: Who the Fuck is Evil Steve
Picking up from Episode 2: Good Idea Fairy Hunting we continue exploring the concept of security as a people problem.
This week we stop to take a moment to focus on the Who rather than the What is attacking us. In CyberSecurity, we tend to get caught up in things that happen to us, that we forget that it is actually a person attacking us. Learning more about who wants the information we have will tell us the ways they go about stealing it. This gives us information to better protect our assets and begin active threat hunting. The show is about 15 minutes long.
Links to information about Threat Actors listed below:
https://www.cisa.gov/
https://www.cisa.gov/cybersecurity
https://www.cisa.gov/cert
https://www.csoonline.com/article/3619011/the-10-most-dangerous-cyber-threat-actors.html
https://threatmap.checkpoint.com/
Hosted on Acast. See acast.com/privacy for more information.