Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Because Nothing Says 'Security' Like a Dozen Firewalls and a Biometric Scannerhttps://t.me/+li0tDAgOYDNkZTBhhttps://boosty.to/overkill_security... more
FAQs about Overkill Security:How many episodes does Overkill Security have?The podcast currently has 71 episodes available.
September 15, 2024Benefits and Drawbacks of NSA’s Advisory. The Double-Edged SwordThis part discusses the benefits and potential drawbacks of advisories issued by agencies like CISA and NSA, highlighting the importance of balancing security measures with operational needs....more3minPlay
September 14, 2024Mitigations to Strengthen Defense. The Cybersecurity Workout PlanThis part outlines various mitigations and best practices recommended by CISA to strengthen cloud security, including the use of multi-factor authentication and continuous monitoring....more5minPlay
September 13, 2024Defense through Cybersecurity Fundamentals. The Basics Never Looked So GoodThis part emphasizes the importance of basic cybersecurity practices, such as regular audits, secure password management, and timely patching, in defending against cloud attacks....more5minPlay
September 12, 2024Sophistication of Cyber Actors. The James Bonds of the Digital RealmThis part examines the sophistication and adaptability of cyber actors in their efforts to compromise cloud infrastructure....more4minPlay
September 11, 2024Use of Service and Dormant Accounts. Sleeping GiantsThis part explores the use of service and dormant accounts by cyber actors to gain access to cloud environments, highlighting the risks associated with these types of accounts....more4minPlay
September 10, 2024Expansion of Targeting. The More, the MerrierThis part discusses how cyber actors are expanding their targeting to include a broader range of cloud services and accounts, including service and dormant accounts....more4minPlay
September 09, 2024Increased Importance of Initial Access. First Impressions MatterThis part emphasizes the critical role of initial access in cloud security, highlighting how cyber actors focus on gaining this initial foothold to launch further attacks....more4minPlay
September 08, 2024Authentication as a Key Step. We Don't Need No Stinkin' PasswordsThis part explains how cyber actors use stolen access tokens and other authentication methods to bypass traditional password-based security measures in cloud environments....more4minPlay
September 07, 2024TTPs Details. The Cyber Magician's HandbookThis part provides a detailed look at the tactics, techniques, and procedures (TTPs) used by cyber actors to gain initial access to cloud environments, including brute forcing, password spraying, and token authentication....more9minPlay
September 06, 2024Adaptation to Cloud Services. Chameleons of the Cyber WorldThis part details how cyber actors are adapting their tactics to exploit cloud services, blending in with legitimate traffic to evade detection....more3minPlay
FAQs about Overkill Security:How many episodes does Overkill Security have?The podcast currently has 71 episodes available.