
Risky Business #782 -- Are the USA and Russia cyber friends now?
Risky Business
Enhancing Network Security through Monitoring
This chapter emphasizes the critical role of monitoring VPN usage and traffic patterns to identify unusual access behaviors. It discusses the implementation of risk-based strategies and tools like Zeek and Shodan for improving network security, highlighting the necessity of effective auditing and real-time monitoring. The conversation also touches on the challenges of detecting hidden devices within the network and advocates for a balanced approach to passive and active monitoring strategies.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.