See through the mask of MAC address spoofing! | A Halloween
Автор: Phosphorus Cybersecurity Inc.
Загружено: 2024-10-31
Просмотров: 49
Описание:
Don't get scared, but we're going to talk about all manner of hauntings. From old-timey costumes to masked IoT and OT devices hiding on your network, James McCarthy takes the driver's seat to pilot the good ship Phosphorus LIVE through the murky waters of this Halloween event.
Down to business: Attackers can disguise devices like Raspberry Pis to look like something they’re not—tricking you into thinking you’re interacting with a legitimate device when it’s actually nefarious.
James McCarthy tells guest Dan Craig how...
Attackers use MAC address spoofing to “dress up” devices.
Passive detection systems relying on MAC addresses can be deceived.
Your organization can protect against this kind of trickery and ensure you’re talking to the right device.
This is a must-watch episode if you’re curious about how attackers manipulate xIoT devices and how to stay one step ahead.
Every other Thursday, join hosts Mike Huckaby and James McCarthy for informational and candid discussions aimed at simplifying the world of xIoT and talking about real-world situations, the worst xIoT offenders, and the state of current threats that cybersecurity and IoT/OT leaders face today.
Get it on your calendar over at https://okt.to/cGv8d0.
Follow Phosphorus for more on xIoT security management from discovery to remediation at https://okt.to/pl8O4i.
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: