Smashing Security cover image

We’re sorry. Wait, did a company actually say that?

Smashing Security

00:00

Modeling attacks as dynamic attack graphs

Snehal describes Node Zero's approach: reconnaissance, credential harvesting, attack-path analytics, and consequences.

Play episode from 34:09
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app