
Recent Cyber Security Laws & Regulations - Lee Kim - PSW #842
Paul's Security Weekly (Audio)
Navigating EDR Challenges in Cybersecurity
This chapter explores the complex issue of EDR bypassing in cybersecurity, focusing on a vulnerability exploited by attackers using tools like EDR Kill Shifter. It emphasizes the need for vigilant and innovative approaches in endpoint detection and response while illustrating the collaborative responsibilities among software providers and security solutions. The discussion reflects on the evolving landscape of cyber threats over two decades, highlighting the balance between technological advancements and the need for adaptive security measures.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.