
Sign up to save your podcasts
Or


This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe shares his thoughts on these questions, as well as addressing the risks of introducing IoT for ease of use but sacrificing security and how you can prevent and reduce the risk of abuse to your critical information assets.
By TEISS5
33 ratings
This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe shares his thoughts on these questions, as well as addressing the risks of introducing IoT for ease of use but sacrificing security and how you can prevent and reduce the risk of abuse to your critical information assets.

8,010 Listeners