
Sign up to save your podcasts
Or
In this episode,Attila and Matt explore how legacy protocols like NTLM leave networksvulnerable to attacks, allowing hackers to capture credentials and gain accesswith minimal effort. They highlight the need for VLAN segmentation, updatedWi-Fi security, and strong endpoint defenses. The discussion also touches onrisks from social engineering and insecure web platforms, stressing thatcybersecurity is about building barriers that make breaches harder.
In this episode,Attila and Matt explore how legacy protocols like NTLM leave networksvulnerable to attacks, allowing hackers to capture credentials and gain accesswith minimal effort. They highlight the need for VLAN segmentation, updatedWi-Fi security, and strong endpoint defenses. The discussion also touches onrisks from social engineering and insecure web platforms, stressing thatcybersecurity is about building barriers that make breaches harder.