
Sign up to save your podcasts
Or


Phishing. DDoS attacks. Social engineering. These are not new terms if you know anything about cybersecurity. But emerging technologies are making these well-known methods of attack easier than ever.
Bad actors are paying attention—and they are leveling up their skills accordingly.
It isn’t just cybersecurity professionals who have to be aware and responsive– people working in product security are a part of the effort, too. What do they need to know to respond to these newer attacks?
This season, hosts Emily Bock and Vincent Danen will dig into how the security landscape has changed, and how IT professionals can work together to prevent and prepare for whenever, wherever, and however threats emerge.
By Red Hat4.7
5656 ratings
Phishing. DDoS attacks. Social engineering. These are not new terms if you know anything about cybersecurity. But emerging technologies are making these well-known methods of attack easier than ever.
Bad actors are paying attention—and they are leveling up their skills accordingly.
It isn’t just cybersecurity professionals who have to be aware and responsive– people working in product security are a part of the effort, too. What do they need to know to respond to these newer attacks?
This season, hosts Emily Bock and Vincent Danen will dig into how the security landscape has changed, and how IT professionals can work together to prevent and prepare for whenever, wherever, and however threats emerge.

186 Listeners

288 Listeners

2,004 Listeners

372 Listeners

580 Listeners

1,027 Listeners

289 Listeners

318 Listeners

417 Listeners

989 Listeners

8,068 Listeners

177 Listeners

315 Listeners

62 Listeners

141 Listeners