Artwork

Conteúdo fornecido por e360 and Brad Bussie. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por e360 and Brad Bussie ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !

S1 EP. 15: Hotel Check-In Kiosk Exposes Room Access Codes, Microsoft Introduces Red Team Augmentation, AT&T Breach

21:24
 
Compartilhar
 

Manage episode 411296527 series 3549974
Conteúdo fornecido por e360 and Brad Bussie. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por e360 and Brad Bussie ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

In the 15th episode of the State of Enterprise IT Security Edition, Brad Bussie, the Chief Information Security Officer at e360, discusses critical vulnerabilities and innovations within the IT security landscape.

The episode covers a range of topics from a security breach at a budget hotel chain, Microsoft's AI-driven red team augmentation, to the massive AT&T breach impacting 70 million users. Bussie emphasizes the importance of secure coding practices, the potential of AI in cybersecurity, and actionable steps for individuals and organizations to protect against breaches.

Timestamps:
[00:01:00] Hotel Self Check-In Kiosk Vulnerability:
- A security flaw in a budget hotel's self check-in kiosks exposed room access codes, affecting potentially 600 hotels in 20 countries.
- The vulnerability underscores the critical need for rigorous secure code practices and thorough application architecture understanding.

[00:06:30] Microsoft’s Red Team Augmentation via AI:
- Partnership with OpenAI to introduce a Python Risk Identification Toolkit (PYRIT) aiming at exposing vulnerabilities through AI.
- This development highlights the evolving role of AI in cybersecurity, moving towards augmenting human capabilities rather than replacing them.

[00:14:00] AT&T Breach Impacting 70 Million Users:
- Sensitive information including social security numbers and passcodes were compromised and found on the dark web.
- The breach illustrates the ongoing risks of data theft and the importance of protective measures such as credit freezes and vigilant password management.

About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.

About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise.

  continue reading

29 episódios

Artwork
iconCompartilhar
 
Manage episode 411296527 series 3549974
Conteúdo fornecido por e360 and Brad Bussie. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por e360 and Brad Bussie ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.

In the 15th episode of the State of Enterprise IT Security Edition, Brad Bussie, the Chief Information Security Officer at e360, discusses critical vulnerabilities and innovations within the IT security landscape.

The episode covers a range of topics from a security breach at a budget hotel chain, Microsoft's AI-driven red team augmentation, to the massive AT&T breach impacting 70 million users. Bussie emphasizes the importance of secure coding practices, the potential of AI in cybersecurity, and actionable steps for individuals and organizations to protect against breaches.

Timestamps:
[00:01:00] Hotel Self Check-In Kiosk Vulnerability:
- A security flaw in a budget hotel's self check-in kiosks exposed room access codes, affecting potentially 600 hotels in 20 countries.
- The vulnerability underscores the critical need for rigorous secure code practices and thorough application architecture understanding.

[00:06:30] Microsoft’s Red Team Augmentation via AI:
- Partnership with OpenAI to introduce a Python Risk Identification Toolkit (PYRIT) aiming at exposing vulnerabilities through AI.
- This development highlights the evolving role of AI in cybersecurity, moving towards augmenting human capabilities rather than replacing them.

[00:14:00] AT&T Breach Impacting 70 Million Users:
- Sensitive information including social security numbers and passcodes were compromised and found on the dark web.
- The breach illustrates the ongoing risks of data theft and the importance of protective measures such as credit freezes and vigilant password management.

About the Show:
The State of Enterprise IT Security podcast is your go-to source for the latest in IT security, offering approachable and actionable insights for technology leaders. Join us as we explore the complexities of cybersecurity and the innovative solutions driving the industry forward.

About e360:
e360 excels in delivering specialized technology solutions across Cloud, Cybersecurity, Digital Workplace, Modern Infrastructure, and Managed Services. We are at the forefront of driving digital transformation for global and national enterprises with our top-tier expertise.

  continue reading

29 episódios

Alle afleveringen

×
 
Loading …

Bem vindo ao Player FM!

O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.

 

Guia rápido de referências