『Cybersecurity Under Pressure. Real Attacks, Real Lessons』のカバーアート

Cybersecurity Under Pressure. Real Attacks, Real Lessons

Cybersecurity Under Pressure. Real Attacks, Real Lessons

著者: Antonio González
無料で聴く

今ならプレミアムプランが3カ月 月額99円

2026年5月12日まで。4か月目以降は月額1,500円で自動更新します。

概要

This podcast breaks down real cybersecurity incidents to understand what actually went wrong, not in theory, but in practice. Each episode analyzes a recent attack, explains the technical mechanics in clear language, and translates them into concrete lessons for security, engineering, and business teams. The focus is on operational reality, decision making under pressure, and the controls that truly reduce risk in production environments.Antonio González
エピソード
  • The Great Bifurcation: Why Average Security Is Disappearing (And Which Side You’re On)
    2026/04/10

    Global breach costs just fell for the first time in five years. So why did US costs hit record highs? The answer reveals a market splitting in two: organizations with disciplined governance that absorb attacks and recover, and those entering a spiral of escalating costs and regulatory scrutiny.

    This episode targets the C-suite and security leaders navigating NIS2 compliance. We analyze the $1.9 million resilience gap, the 80-day detection advantage, and why AI adoption without operational discipline is just expensive theater. As the middle tier of "average security" vanishes, we examine the hard questions boards must ask: Are you building organizational capacity to withstand shocks, or merely purchasing prevention tools while your operational fundamentals remain unchanged? The bifurcation is here. The only question is which curve you’re riding.

    続きを読む 一部表示
    37 分
  • The 56% Problem: Why Attackers No Longer Need Passwords (IBM X-Force Analysis)
    2026/04/08

    The 2026 IBM X-Force Threat Intelligence Index reveals a chilling statistic: more than half of last year’s exploited vulnerabilities required zero authentication to breach. The barrier to entry hasn’t disappeared—it has shifted from sophistication to pure velocity.

    In this episode we explore why "basic hygiene" is a dangerously vague concept and what "exposure management" actually means in practice. We break down the compression of the attack window from disclosure to exploitation, the rise of machine-to-machine identity as the new perimeter, and why your patching tempo measured in tickets is losing against adversaries measuring in API calls. Whether you’re managing cloud infrastructure or industrial control systems, this discussion reframes the boardroom conversation from "Are we protected?" to "Are we fast enough?

    続きを読む 一部表示
    35 分
  • When Your Security Scanner Becomes the Trojan Horse: The CERT-EU Supply Chain Breach
    2026/04/06

    What happens when the tool you download to find vulnerabilities becomes the vulnerability itself? This week we dissect the European Commission breach where attackers exfiltrated 91.7GB of sensitive data through Trivy, a trusted open-source security scanner.

    We walk through the anatomy of a supply chain poisoning: how threat actors compromised upstream distribution channels, why traditional "trust but verify" models failed, and the three concrete controls that would have contained the blast radius. From artifact provenance verification to ephemeral CI/CD credentials, this episode translates the incident into an actionable playbook for security architects. If you’re ingesting third-party tools without cryptographic verification, this is the wake-up call you need before your next sprint.

    続きを読む 一部表示
    43 分
まだレビューはありません