Listen "Security on Easy Mode"
Episode Synopsis
Recently in the security space, there’s been a spate of contradicting priorities. For instance, a recent study showed that programmers will take the easy way out and not implement proper password security. Antidotally, a security pro in a networking and security course noticed another attendee who covered his webcam, but noticeably had his bitlocker recovery code is printed on a label attached to his screen. When protocols and skills compete for our attention, ironically, security gets placed on easy mode. In the real word, when attackers can potentially create malware that would automatically add “realistic, malignant-seeming growths to CT or MRI scans before radiologists and doctors examine them.” How about that time when ethical hackers were able to access a university’s student and staff personal data, finance systems and research networks? Perhaps more education and awareness might be needed to take security out of easy mode and bring it in real-time alerting mode.
Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varonisX/Twitter: https://twitter.com/varonisInstagram: https://www.instagram.com/varonislife/
Want to join us live? Save a seat here: https://www.varonis.com/state-of-cybercrimeMore from Varonis ⬇️ Visit our website: https://www.varonis.comLinkedIn: https://www.linkedin.com/company/varonisX/Twitter: https://twitter.com/varonisInstagram: https://www.instagram.com/varonislife/
More episodes of the podcast State of Cybercrime
Black Hat Cartels
31/10/2025
Supply Chain Attacks
20/09/2025
ShinyHunters' CRM Heist
18/08/2025
Salt Typhoon Returns
25/07/2025
Copilot's Zero-Click Vulnerability
18/06/2025
UK Retail Under Siege
21/05/2025
The Oracle Breach Debate
19/04/2025
$1.5B ByBit Crypto Heist
14/03/2025
DeepSeek Disruption
04/02/2025
U.S. Treasury Breach
15/01/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.