
Sign up to save your podcasts
Or


Modern intrusions don't start with cinematic malware. They start with a login.
When compromised accounts meet exposed gateways, attackers gain trusted paths deep into critical environments—no alarms triggered, no malware needed. The reality is that identity abuse and edge exploitation are no longer separate threats; attackers chain them into a unified intrusion model.
In this episode, we dissect exactly how that kill chain works, why it specifically endangers operational sectors like rail and automotive, and why defending identity and perimeter in separate silos creates dangerous blind spots.
Inside this episode:
Essential for: CISOs, security architects, SOC analysts, and OT security teams defending critical infrastructure.
Follow the show for weekly deep dives on zero trust, identity security, and modern intrusion detection.
By Antonio GonzálezModern intrusions don't start with cinematic malware. They start with a login.
When compromised accounts meet exposed gateways, attackers gain trusted paths deep into critical environments—no alarms triggered, no malware needed. The reality is that identity abuse and edge exploitation are no longer separate threats; attackers chain them into a unified intrusion model.
In this episode, we dissect exactly how that kill chain works, why it specifically endangers operational sectors like rail and automotive, and why defending identity and perimeter in separate silos creates dangerous blind spots.
Inside this episode:
Essential for: CISOs, security architects, SOC analysts, and OT security teams defending critical infrastructure.
Follow the show for weekly deep dives on zero trust, identity security, and modern intrusion detection.