Risky Business cover image

Risky Business #730 -- Apple, Facebook go all in on e2ee

Risky Business

CHAPTER

Enhancing Detection Strategies in Cybersecurity

The chapter discusses the challenges of detecting post-compromise activities in a cyber environment, emphasizing the need for a shift in focus towards enduring detection methods and efficient strategies. It highlights the importance of adapting security solutions to evolving cyber threats and the value of providing detection engineering advantages to organizations, referencing tactics like 'living off the land' techniques and the use of canaries for reliable detection.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner