5min chapter

Detection: Challenging Paradigms cover image

Episode 9: Andy Robbins

Detection: Challenging Paradigms

CHAPTER

How to Differ Between Approved Use and Unapproved Use

Johnny: I think that generally we as defenders are really bad at being able to differentiate between approved use and unapproved use So like it's easy conceptually To detect pis exact. But then once you've detected it now, not everything that you detect with that is bad. Johnny: What if instead the attack path was explored one step at a time,. You know very quietly very covertly but also very quickly as in as fast as Software can run so this worm lands on a system It determines what systems this user has admin rights on And pivots to those systems repeat repeat repeat um In my own experience with analyzing, uh, you know, bloodhound databases for our customers Let me re

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode