Risky Business cover image

Risky Business #782 -- Are the USA and Russia cyber friends now?

Risky Business

CHAPTER

Enhancing Network Security through Monitoring

This chapter emphasizes the critical role of monitoring VPN usage and traffic patterns to identify unusual access behaviors. It discusses the implementation of risk-based strategies and tools like Zeek and Shodan for improving network security, highlighting the necessity of effective auditing and real-time monitoring. The conversation also touches on the challenges of detecting hidden devices within the network and advocates for a balanced approach to passive and active monitoring strategies.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner