Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Defending the Frontline: Ransomware, AI, and Real-World Lessons | Alexander Rau | The Defender's Log

Автор: ADAMnetworks

Загружено: 2025-10-30

Просмотров: 79

Описание:

Have cyber attacks ever been this bad? According to our guest, this was the busiest summer for incident response on record.

In this episode, host David Redekop sits down with Alexander Rau, Partner in Cybersecurity at KPMG, to share real-world "horror stories" from the front lines of digital defense. Alex reveals why a flood of zero-day vulnerabilities in firewalls kept his team at capacity and what he expects for the rest of the year.

Join us as we pull back the curtain on the evolving tactics of modern threat actors.

You'll learn:
How ransomware groups are using AI chatbots to conduct initial negotiations.
Why attackers are so busy, some have stopped stealing data just to encrypt faster.
The human element: How deepfakes and social engineering are bypassing traditional defenses.
The immense (and unaddressed) risk facing small-to-medium businesses (SMBs).
The "marathon, not a sprint" mindset required to survive a major breach.
The complex business and ethical dilemma of whether or not to pay the ransom.

This is an in-the-trenches look at the state of cybersecurity that you don't want to miss. Alex's final piece of advice, especially for small businesses, is simple: "Ask for help."

Find Our Guest:
Alexander Rau: Partner, Cybersecurity at KPMG

Subscribe to The Defender's Log for more insights from the industry's top security chiefs, CISOs, and architects.

Defending the Frontline: Ransomware, AI, and Real-World Lessons | Alexander Rau | The Defender's Log

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Inside DNS Threat Intelligence: Privacy, Security & Innovation | Tim Adams | The Defender's Log

Inside DNS Threat Intelligence: Privacy, Security & Innovation | Tim Adams | The Defender's Log

Cybersecurity IDR: Incident Detection & Response | Google Cybersecurity Certificate

Cybersecurity IDR: Incident Detection & Response | Google Cybersecurity Certificate

Мессенджер Max: разбираемся без паранойи и даем советы по безопасности

Мессенджер Max: разбираемся без паранойи и даем советы по безопасности

AI and the Future of Cybersecurity: CISO Harvard Roundtable

AI and the Future of Cybersecurity: CISO Harvard Roundtable

Противодействие наблюдению с помощью Bluetooth!

Противодействие наблюдению с помощью Bluetooth!

The Dark Truth About Modern Cyber Threats | Joshua Domagalski | CISO Astronomer | Defender's Log

The Dark Truth About Modern Cyber Threats | Joshua Domagalski | CISO Astronomer | Defender's Log

Private Credit: An Allocator’s Perspective

Private Credit: An Allocator’s Perspective

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

Cybersecurity Trends for 2025 and Beyond

Cybersecurity Trends for 2025 and Beyond

«Мессенджер Max — это МЕНТ в вашем телефоне» | Как безопасно звонить и обходить блокировки в России

«Мессенджер Max — это МЕНТ в вашем телефоне» | Как безопасно звонить и обходить блокировки в России

Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski | Episode 1

Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski | Episode 1

Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED

Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED

SOC Interview Questions and Answers

SOC Interview Questions and Answers

Zero-Click Attacks: AI Agents and the Next Cybersecurity Challenge

Zero-Click Attacks: AI Agents and the Next Cybersecurity Challenge

What is a Zero Day Threat?

What is a Zero Day Threat?

Mike with Erin from Phoenix Equipment

Mike with Erin from Phoenix Equipment

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

5 тревожных знаков, что ИИ — это пузырь! Как не попасть в ловушку?

5 тревожных знаков, что ИИ — это пузырь! Как не попасть в ловушку?

Бабка отсудит твою квартиру: ПОЛНЫЙ РАЗБОР ОТ ЮРИСТА

Бабка отсудит твою квартиру: ПОЛНЫЙ РАЗБОР ОТ ЮРИСТА

Cyber Security Headlines: Week in Review (September 29 - October 3, 2025)

Cyber Security Headlines: Week in Review (September 29 - October 3, 2025)

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]