Artwork

Konten disediakan oleh Cyber Crime Junkies. Host David Mauro.. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Cyber Crime Junkies. Host David Mauro. atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Player FM - Aplikasi Podcast
Offline dengan aplikasi Player FM !

Cyber Flash Point. Breaking News on Insider Threats to US Organizations

23:57
 
Bagikan
 

Manage episode 430574632 series 3370503
Konten disediakan oleh Cyber Crime Junkies. Host David Mauro.. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Cyber Crime Junkies. Host David Mauro. atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.

How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations.
Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber flash points, Insider Threat, how the DRPK uses it workers for cybercrime, common insider risks in security, new types of insider risks in security, stories of insider risks in cyber security, containment, vetting processes, security monitoring

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapter

1. Introduction: The Threat of Insider Imposters (00:00:00)

2. Infiltration: How a North Korean Spy Gained Trust (00:04:25)

3. Detection: Unusual Network Activity Raises Red Flags (00:08:51)

4. Containment: Preventing Further Compromise (00:10:22)

5. The Reality of Insider Threats (00:16:04)

6. Addressing Insider Threats: Collaboration and Vigilance (00:20:55)

213 episode

Artwork
iconBagikan
 
Manage episode 430574632 series 3370503
Konten disediakan oleh Cyber Crime Junkies. Host David Mauro.. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Cyber Crime Junkies. Host David Mauro. atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.

How would you know if a seemingly perfect employee was actually an imposter? Behind this facade was a North Korean operative, a meticulously trained spy. In Cyber Flash Point we cover Breaking News on Insider Threats to US Organizations.
Topics: Insider Threats to US Organizations, how to reduce insider threats, top cyber flash points, Insider Threat, how the DRPK uses it workers for cybercrime, common insider risks in security, new types of insider risks in security, stories of insider risks in cyber security, containment, vetting processes, security monitoring

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapter

1. Introduction: The Threat of Insider Imposters (00:00:00)

2. Infiltration: How a North Korean Spy Gained Trust (00:04:25)

3. Detection: Unusual Network Activity Raises Red Flags (00:08:51)

4. Containment: Preventing Further Compromise (00:10:22)

5. The Reality of Insider Threats (00:16:04)

6. Addressing Insider Threats: Collaboration and Vigilance (00:20:55)

213 episode

Tutti gli episodi

×
 
Loading …

Selamat datang di Player FM!

Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.

 

Panduan Referensi Cepat