Cyber Security & Cloud Podcast podcast

CSCP S4EP09 - Micheal Smith - Code to Network Reachability how to use WAF to prioritize vulnerabilities

0:00
39:00
Retroceder 15 segundos
Avanzar 15 segundos

 

This is an enlightening conversation with Michael Smith exploring the intersection between vulnerabilities, DDoS and WAF technologies. 

Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth of experience from military intelligence to web application development to the table, shedding light on how engineering and integration teams navigate regulations and government sector compliance.

 

The episode is brought to you by Phoenix Security; get in control of your vulnerabilities from code to cloud with the power of Phoenix. ACT Now on the most important vulnerabilities and reduce your exposure to modern attacks. See it for yourself. Go to https://phoenix.security/request-a-demo/ for a free 14-day licence.

Our conversation ventures into the complexities of application security and the strategic utilization of vulnerabilities. Venture into the murky waters of cyberattacks with us as we discuss how vulnerabilities can be harnessed for DDoS attacks, causing chaos at both the network and application layers. Hear about Phoenix Security Limited's role in software security and how unvalidated pagination can be exploited to strain databases and servers. We wrap up this segment by contrasting the precision of these attacks with broader network-level DDoS strategies, offering insight into crafting robust cybersecurity defenses. Cap off this episode with a crucial discussion on the ethical dimensions of technology. Discover the challenges of differentiating between benign and malicious bot activity, and how technologies like domain fronting have dual purposes. We stress the importance of vigilance and responsibility in the tech sphere, where the same tools can secure or compromise systems. Remember to stay engaged with the content by checking your logs for anomalies and sharing your thoughts for a chance to win an Amazon gift card. Michael's insights are a reminder of the persistent evolution and nuanced nature of cybersecurity in our interconnected world.  

Tune in to this enlightening episode to equip yourself with the knowledge and insights needed to navigate the evolving landscape of cybersecurity.

  • 00:02: Introduction to Cybersecurity and Cloud Podcast
  • 00:53: Host and Guest Introduction
  • 01:40: Michael Smith's Journey in Cybersecurity
  • 03:23: Shift Towards Security
  • 04:22: The Evolution of Cybersecurity Roles
  • 06:58: Challenges in IoT and Hardware Security
  • 08:22: Insights from Akamai and Handling Major Incidents
  • 09:58: The Evolution of Cybersecurity Threats
  • 11:35: The Current State of Cybersecurity
  • 14:49: The Future of Cybersecurity and Emerging Threats
  • 17:22: Leveraging Vulnerabilities for DDoS Attacks
  • 22:51: Addressing Sophisticated Cybersecurity Threats
  • 26:27: Advanced Cybersecurity Techniques and Challenges
  • 29:00: The Importance of Collaboration in Cybersecurity
  • 33:58: Closing Thoughts and Positive Takeaways
  • 39:01: Outro and Acknowledgments

 

 

  • Cyber Security and Cloud Podcast hosted by Francesco Cipollone
  • Twitter @FrankSEC42
  • Linkedin: linkedin.com/in/fracipo 
  • #CSCP #cybermentoringmonday cybercloudpodcast.com 

 

 

#Cybersecurity, #appsec #waf 

Otros episodios de "Cyber Security & Cloud Podcast"