Listen "The Mechanics of Digital Crime"
Episode Synopsis
Ever wonder why it's so difficult to really secure a network, systems or data? Cyber criminals are stepping up their game, even as security gets stronger and stronger, and they’re using all sorts of new techniques to break through enterprise walls. In this episode, hosts Nic Fillingham and Natalia Godyla speak with Donal Keating, Director of Innovation and Research for the Microsoft Digital Crimes Unit, about one of the key findings in the latest Microsoft Digital Defense Report: how attackers are adapting and becoming more sophisticated. Plus how social engineering is revealing the true weakest link in any security plan -- and it’s something you might not expect. Then they dive into what it’s like to hunt threats with Michelle Lam, who brings fresh eyes to every security problem she faces at Microsoft. She explains why not spending time in a SOC early in her career helps her spot potential attacks others might miss, and why she’s so passionate about helping serve under-represented communities and inspiring the next generation of security professionals. In This Episode, You Will Learn:How cyber attackers are using the cloud Why humans are the weakest link in every security system The new steps cyber criminals are taking to get people to trust them How threat hunters look for malicious activity How networking helps young security professionals Some Questions We Ask: What new threat trends are emerging? How should security professionals prepare for new threats? What is a homoglyph? Why is threat hunting a uniquely human-based activity? Resources Microsoft Digital Defense Report, September 2020 Donal’s LinkedInMichelle’s LinkedInNic’s LinkedInNatalia’s LinkedInMicrosoft Security BlogRelated:Listen to: Afternoon Cyber Tea with Ann JohnsonListen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. Hosted on Acast. See acast.com/privacy for more information.
More episodes of the podcast Security Unlocked
Securing Redirections with Mike Macelletti
25/06/2025
Protecting AI at the Edge with David Weston
28/05/2025
Hacking at the Weeds with Felix Boulet
14/05/2025
Evolutions in Hacking with Marco Ivaldi
30/04/2025
Cryptojacking, and Farewell for Now!
16/02/2022
A look at Cybercrime in 2021
02/02/2022
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.