Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/9b/dc/ae/9bdcae65-6689-2f1a-e736-5da6be9bc80b/mza_10611344606197729895.jpg/600x600bb.jpg
The Cosive Podcast - Cyber Threat Intelligence and Security Operations
Cosive
12 episodes
1 day ago
The Cosive Podcast features in-depth interviews with security leaders on topics relevant to Cyber Threat Intelligence and Security Operations.
Show more...
Technology
RSS
All content for The Cosive Podcast - Cyber Threat Intelligence and Security Operations is the property of Cosive and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Cosive Podcast features in-depth interviews with security leaders on topics relevant to Cyber Threat Intelligence and Security Operations.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/38723742/574b22ea0abf09ff.png
Securing REST API Endpoints (or How to Avoid Another Optus) with James Cooper
The Cosive Podcast - Cyber Threat Intelligence and Security Operations
35 minutes 29 seconds
3 years ago
Securing REST API Endpoints (or How to Avoid Another Optus) with James Cooper
Unless you have been living in a cave on Mars with your eyes shut and your fingers in your ears for the past few weeks, you have probably heard something about a data breach at Australian telecommunications giant Optus. As security mistakes go, the vulnerability reported to have enabled the attack leans toward the more embarrassing side of the scale. If reports are true, Optus has effectively exposed customer data on an endpoint available to the entire internet. While it is plausible that a developer will forget to (re)secure an endpoint once they finish their development work, there are multiple practical steps you can take to catch or mitigate the problem.
The Cosive Podcast - Cyber Threat Intelligence and Security Operations
The Cosive Podcast features in-depth interviews with security leaders on topics relevant to Cyber Threat Intelligence and Security Operations.