The Cybersecurity Defenders Podcast cover image

Malicious geopolitical cyber activity, cyberattacks tied to conflict in Iran, open source supply chain attack & AI autonomous espionage / Intel Chat [#306]

The Cybersecurity Defenders Podcast

00:00

Practical mitigations for destructive attacks

Matt and Christopher recommend least privilege, MFA, hardware keys, approvals and immutable backups.

Play episode from 12:01
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app