Latest Network segmentation Podcast Episodes
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 8: The U.S. Department of Homeland Security Sounds the Alarm over DNS Attacks
The Webroot Podcast - May 22, 2020 19:00 - 11 minutesThis episode of Hackers Files examines the strange saga of a rare U.S. Department of Homeland Security emergency directive ordering all U.S. federal civilian agencies to secure the login credentials for their internet domain records.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Biometric Data – Managing Risks
The Webroot Podcast - May 15, 2020 23:00 - 10 minutesFrom fingerprints to facial recognition, biometrics aren’t just for sci-fi anymore. But as these technologies grow in prevalence, so do related cyber risks. Host Joe talks with Kelvin Murray, Sr. Threat Research Analyst, about the benefits vs. security risks biometrics present.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 7: How Risky Clicks Equal Big Ransoms for Local Governments
The Webroot Podcast - May 01, 2020 23:00 - 13 minutesIn Episode 7 of Hacker Files, Joe Panettieri and Webroot guest George Anderson discuss ransomware attacks against local governments in Georgia and New York, and how cybersecurity training could help minimize incidents at a fraction of the cost of a breach.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Is HTTPS Really Making Us More Secure?
The Webroot Podcast - April 24, 2020 22:00 - 10 minutesThe idea behind HTTPS is to create a secure, encrypted connection between your browser and a website. Does it work? Joe Panettieri and Webroot’s Hal Lonas discuss.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 6: Is HTTPS Really Making Us More Secure?
The Webroot Podcast - April 24, 2020 22:00 - 10 minutesThe idea behind HTTPS is to create a secure, encrypted connection between your browser and a website. Does it work? Joe Panettieri and Webroot’s Hal Lonas discuss.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Quantum Computing and Security
The Webroot Podcast - April 17, 2020 06:00 - 16 minutesWhile quantum computing has numerous positive implications, some critics worry hackers will leverage this technology for nefarious purposes. Host Joe sits down with Grayson Milbourne, Security Intelligence Director, to get a cybersecurity experts’ perspective.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 5: Botnets - New Tricks with Old Exploits
The Webroot Podcast - April 10, 2020 19:00 - 11 minutesA five-year-old exploit for home router software was recently used to launch massive spam campaigns. Joe Panettieri and Webroot’s Hal Lonas discuss botnets and how to stop them.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 4: Landing the Big One with Spear Phishing
The Webroot Podcast - April 03, 2020 20:00 - 14 minutesSpear phishing, a hyper-targeted form of the classic phishing attack, is rapidly gaining popularity and financial success. Hear Joe Panettieri and Webroot’s Hal Lonas discuss this highly-sophisticated tactic.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 3: The Sordid Story of Cryptojacking
The Webroot Podcast - March 30, 2020 02:00 - 12 minutesHow was Tesla duped into running malware on its own AWS infrastructure? Here, Joe Panettieri and Webroot’s Charlie Tomeo discuss cryptojacking news and its wider repercussions.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 2: RDP - Ransomware's Hottest New Delivery Vector
The Webroot Podcast - March 21, 2020 02:00 - 12 minutesCybercriminals sniff out unsecured remote desktop protocol (RDP) to circumvent even well-planned defenses. Joe Panettieri and Webroot’s Charlie Tomeo discuss RDP as a ransomware delivery strategy.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Recap: A Decade's Worth of Cyber Threats
The Webroot Podcast - March 12, 2020 21:00 - 24 minutesFrom APTs to global ransomware, the last decade has seen major innovations in cybercrime and its targets. Tyler Moffitt, Security Analyst, joins Joe Panettieri to cover key trends from the last 10 years, and what they mean for today’s businesses.
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Episode 1: How to Stop Opening the Door to Phishing Attacks
The Webroot Podcast - December 11, 2019 18:00 - 12 minutesIn mid-2018, PhishPoint wreaked havoc on many Microsoft Office 365 users duping them into sharing their login credentials allowing access to critical systems. Joe Panettieri and Webroot’s Charlie Tomeo explore the uniqueness of this scenario, how cybercriminals manipulate users with phishing a...
![The Webroot Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts123/v4/1d/a8/8d/1da88d9e-374a-a757-d5dd-67092b949b89/mza_10618949961051341826.jpg/100x100bb.jpg)
Case 1: How to Stop Opening the Door to Phishing Attacks
The Webroot Podcast - December 11, 2019 18:00 - 12 minutesIn mid-2018, PhishPoint wreaked havoc on many Microsoft Office 365 users duping them into sharing their login credentials allowing access to critical systems. Joe Panettieri and Webroot’s Charlie Tomeo explore the uniqueness of this scenario, how cybercriminals manipulate users with phishing a...
Related Network segmentation Topics