Artwork

Inhoud geleverd door Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

Threat Intelligence Treasure Hunt with Jonathan Huebner

8:10
 
Delen
 

Manage episode 432512899 series 3591118
Inhoud geleverd door Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Don’t miss out on the SecOps event of the year — Symphony 2024 on April 17-18.

Join industry leaders, tech visionaries, and cybersecurity professionals. See firsthand how AI, automation, and machine learning can empower your team to predict, detect, and respond to threats faster than ever.

In this episode of Threat Vector, host David Moulton and guest John Huebner, an XSIAM Consultant at Palo Alto Networks, delve into the intricacies of managing threat intelligence feeds in cybersecurity. They discuss the challenges organizations face in sifting valuable intelligence from the noise, emphasizing the importance of risk assessments in guiding the selection and tuning of these feeds. John shares strategies for refining signal-to-noise ratios and the risks of neglecting feed updates, underlining the necessity of continuous management and adaptation in threat intelligence. The conversation highlights the dynamic nature of cyber threats and the critical role of proactive, tailored cybersecurity strategies.

Join the conversation on our social media channels:

Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠

Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠

Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠

LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠

YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠

Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠


About Threat Vector

Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.


PALO ALTO NETWORKS

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠⁠http://paloaltonetworks.com⁠

  continue reading

41 afleveringen

Artwork
iconDelen
 
Manage episode 432512899 series 3591118
Inhoud geleverd door Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Don’t miss out on the SecOps event of the year — Symphony 2024 on April 17-18.

Join industry leaders, tech visionaries, and cybersecurity professionals. See firsthand how AI, automation, and machine learning can empower your team to predict, detect, and respond to threats faster than ever.

In this episode of Threat Vector, host David Moulton and guest John Huebner, an XSIAM Consultant at Palo Alto Networks, delve into the intricacies of managing threat intelligence feeds in cybersecurity. They discuss the challenges organizations face in sifting valuable intelligence from the noise, emphasizing the importance of risk assessments in guiding the selection and tuning of these feeds. John shares strategies for refining signal-to-noise ratios and the risks of neglecting feed updates, underlining the necessity of continuous management and adaptation in threat intelligence. The conversation highlights the dynamic nature of cyber threats and the critical role of proactive, tailored cybersecurity strategies.

Join the conversation on our social media channels:

Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠

Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠

Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠

LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠

YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠

Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠


About Threat Vector

Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.


PALO ALTO NETWORKS

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠⁠http://paloaltonetworks.com⁠

  continue reading

41 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding