Threat Vector by Palo Alto Networks cover image

Don't Leave Them to Their Own Devices

Threat Vector by Palo Alto Networks

00:00

Breaking the Attack Chain: Practical Defenses

David asks how attackers chain exposures; Asher recommends proactive measures: define crown jewels, eliminate lateral freedom, remove blind spots, and reduce internet-exposed devices.

Play episode from 30:07
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app