
Sign up to save your podcasts
Or
This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe shares his thoughts on these questions, as well as addressing the risks of introducing IoT for ease of use but sacrificing security and how you can prevent and reduce the risk of abuse to your critical information assets.
5
33 ratings
This week Joe Carson, chief security scientist at Thycotic, takes us through the mind of a hacker. What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe shares his thoughts on these questions, as well as addressing the risks of introducing IoT for ease of use but sacrificing security and how you can prevent and reduce the risk of abuse to your critical information assets.