Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts112/v4/d0/f1/73/d0f17395-d159-0e91-c6f5-0e2991d832c4/mza_2450661454860132760.jpg/600x600bb.jpg
Cybersecurity: Amplified And Intensified
Shiva Maharaj
87 episodes
5 days ago
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm
Show more...
Technology
RSS
All content for Cybersecurity: Amplified And Intensified is the property of Shiva Maharaj and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/14805822/14805822-1652893979229-75a7b94edbcda.jpg
67 - CISA vs. Snake Oil
Cybersecurity: Amplified And Intensified
19 minutes 36 seconds
3 years ago
67 - CISA vs. Snake Oil

Or at least that's my analysis of CISA Alert AA22-137A

It doesn't matter what fancy tools you have if you're using and configuring them incorrectly. 

This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI

In this episode I'm going to review CISA Alert (AA22-137A)
https://www.cisa.gov/uscert/ncas/alerts/aa22-137a

Weak Security Controls and Practices Routinely Exploited for Initial Access

Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]

Download the PDF version of this report (pdf, 430kb).

Cybersecurity: Amplified And Intensified
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm