• Endpoints Of View – Cybersecurity Podcast

  • 著者: SentryBay Limited
  • ポッドキャスト

Endpoints Of View – Cybersecurity Podcast

著者: SentryBay Limited
  • サマリー

  • Endpoints Of View is your go-to podcast for in-depth expert discussions on cybersecurity topics that touch data breaches, credential theft and endpoint security. Information security professionals can tune in for fresh perspectives on defending secure cloud infrastructure, platforms, and applications from info-stealing threat actors deploying Keylogging, Screen Capture, and Malicious Injection malware.

    Episodes are brought to you by SentryBay®, the OEM at the heart of Citrix App Protection. SentryBay's Armored Client solution mitigates against credential theft and data leakage threats securing all major VDI, DaaS and Web environments, client types and operating systems.

    © SentryBay Limited
    続きを読む 一部表示

あらすじ・解説

Endpoints Of View is your go-to podcast for in-depth expert discussions on cybersecurity topics that touch data breaches, credential theft and endpoint security. Information security professionals can tune in for fresh perspectives on defending secure cloud infrastructure, platforms, and applications from info-stealing threat actors deploying Keylogging, Screen Capture, and Malicious Injection malware.

Episodes are brought to you by SentryBay®, the OEM at the heart of Citrix App Protection. SentryBay's Armored Client solution mitigates against credential theft and data leakage threats securing all major VDI, DaaS and Web environments, client types and operating systems.

© SentryBay Limited
エピソード
  • SentryBay Wrapped – Devastating Data Breaches Of 2024 & More!
    2024/12/10

    This year-end episode of the Endpoints Of View podcast discusses the significant rise in cyberattacks globally in 2024, with a 75% increase in weekly averages compared to 2023. All sectors are vulnerable, but education, government, healthcare, and communications are prime targets. Also under discussion is the news that SentryBay is certified for meeting the requirements of ISO 27001 for the development, supply, maintenance and support of IT security software products and the provision of SaaS solutions worldwide.

    Talking Points:

    Increased Data breaches: Several high-profile data breaches exposed sensitive personal information, leading to financial losses and reputational damage for organizations and individuals:

    • Change Healthcare: Exposed protected health information of 100 million individuals, making it the largest healthcare data breach in US history.
    • Synnovis: Ransomware attack crippled pathology services across London, impacting hundreds of thousands of patients and demonstrating the fragility of critical healthcare infrastructure.
    • Ticketmaster: Over 500 million customer records stolen by ShinyHunters, likely exploiting a vulnerability in a third-party cloud data warehouse.
    • AT&T: Unauthorized access and download of call and text records of nearly all AT&T customers, highlighting privacy concerns and risks associated with third-party cloud platforms.
    • Dell: “Grep” accessed and stole data belonging to over 10,000 employees and partners, likely through a phishing campaign.
    • MediSecure: Ransomware attack compromised personal and health information of 12.9 million Australians, making it one of the largest healthcare data breaches in the country.
    • Snowflake Attacks: UNC5537 targeted Snowflake customers, exploiting compromised credentials to access data. The attacks highlighted the importance of multi-factor authentication.

    Importance of ISO 27001 Certification: SentryBay, a leader in endpoint isolation technology, achieved ISO 27001 certification, demonstrating its commitment to information security best practices. The certification provides clients and partners with peace of mind, knowing that SentryBay’s technology aligns with data protection and information security standards.

    続きを読む 一部表示
    14 分
  • Special Edition: International Fraud Awareness Week (IFAW)
    2024/11/19

    International Fraud Awareness Week 2024 (IFAW) serves as a critical reminder of the growing threat of fraud and the importance of robust data security measures for businesses and individuals. This special IFAW edition of SentryBay’s Endpoints Of View podcast provides insights into the evolving fraud landscape, highlighting key threats, costs, prevention strategies, and the critical role of endpoint security.

    Talking Points:

    1. The Escalating Threat of Fraud in a Digital World:

    • Fraudulent activities are increasing at an alarming rate, fueled by rapid digitization and advanced technologies like AI.
    • Cybercriminals leverage AI for sophisticated attacks, including creating fake identities, phishing scams, forging documents, and impersonation using voice cloning and deepfakes.

    2. The High Cost of Data Breaches:

    • The global average cost of a data breach reached $4.45 million in 2024, encompassing financial losses, reputational damage, regulatory fines, and remediation costs.
    • Data breaches erode trust among customers and employees, leading to irreparable reputational harm and potential identity theft.

    3. Key Cyber Threats:

    • Keylogging: Malicious software or hardware records a user's keystrokes to capture sensitive information.
    • Screen Capture: Cybercriminals take screenshots of a victim's device to reveal sensitive data displayed on the screen.
    • Malicious Injection: Harmful code is inserted into legitimate applications or websites to compromise databases and critical infrastructure.
    • Insider Threats: Employees, contractors, or suppliers with insider access can intentionally or unintentionally compromise data security, leading to data theft, sabotage, or data leaks.

    4. The Crucial Role of Endpoint Security:

    • Endpoint security serves as the frontline defense against cyber threats, protecting devices like desktops, laptops, and mobile phones.
    • Key features include real-time threat detection, multi-layered defense, behavioral analytics, and patch management.

    5. Building a Culture of Fraud Prevention:

    • Employee education and training are paramount to help staff recognize phishing attempts, report suspicious activity, and adhere to best practices.
    • Organizations must establish robust fraud risk assessment procedures and incident response plans.
    • A culture of transparency and trust encourages employees to report suspicious activities.

    6. Proactive Measures and Best Practices:

    • Implement comprehensive data protection measures to comply with regulations like GDPR and CCPA.
    • Adopt robust solutions with built-in prevention, detection, and real-time threat response capabilities.
    • Establish clear company policies, least-privilege access controls, and monitoring capabilities to mitigate insider threats.
    続きを読む 一部表示
    22 分
  • Why Stock Exchanges Are Increasingly Vulnerable To Data Breaches
    2024/10/29

    This episode of the Endpoints Of View podcast discusses the prevalence of cyberattacks on stock exchanges. Research by IOSCO and the World Federation of Exchanges indicates that approximately half of the world’s securities exchanges have experienced cyberattacks.

    Talking points include:

    • Cybersecurity vulnerabilities of stock exchanges: Stock exchanges are increasingly vulnerable to cyberattacks, which can have serious consequences for market integrity and investor confidence.
    • Regulatory requirements for cybersecurity: Regulatory bodies like the SEC are placing greater emphasis on cybersecurity, requiring timely reporting of incidents and robust security measures.
    • Privileged Access Workstation (PAW) security: Securing privileged access workstations, particularly with “clean keyboard” solutions, is crucial for protecting sensitive data and systems.
    続きを読む 一部表示
    12 分

Endpoints Of View – Cybersecurity Podcastに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。