The Cyber Threat Perspective

Episode 8: Hackers: How we get in and how to stop us

Sep 21, 2022
Discover the primary methods hackers use to gain access to organizations through penetration tests. Dive into the world of credential attacks and the vital role of Multi-Factor Authentication. Explore critical web application vulnerabilities like SQL injection and phishing tactics that exploit user behavior. Learn about effective tools and strategies for enhancing security and fortifying defenses against these persistent threats. This insightful discussion blends technical analysis with practical recommendations to safeguard your organization.
Ask episode
Chapters
Transcript
Episode notes