Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Threat Talks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threat Talks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Breaking the Defenses: EDR Bypass - Threat Talks Cybersecurity Podcast

25:17
 
Share
 

Manage episode 499549364 series 3682930
Content provided by Threat Talks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threat Talks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

🔒 Are endpoint protection solutions enough to safeguard your organization?

In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.

Learn✅ The differences between AVs, EDRs, and XDRs

✅ Common bypass techniques used by attackers

✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy

💡 Key Insights

  • EDRs are essential but not invincible
  • Combining smart tools with robust security practices is the winning strategy

📩 Have questions or thoughts?

Reach out at [email protected]!

🎙️ Follow Threat Talks for weekly cybersecurity insights.=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/breaking-the-defenses-edr-bypass/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

  continue reading

90 episodes

Artwork
iconShare
 
Manage episode 499549364 series 3682930
Content provided by Threat Talks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threat Talks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

🔒 Are endpoint protection solutions enough to safeguard your organization?

In this episode of Threat Talks – The Deep Dive, Rob Maas hosts Luca Cipriano, ON2IT’s Cyber Threat Specialist, to uncover the truth.

Learn✅ The differences between AVs, EDRs, and XDRs

✅ Common bypass techniques used by attackers

✅ Why defense-in-depth and Zero Trust are must-haves for any cybersecurity strategy

💡 Key Insights

  • EDRs are essential but not invincible
  • Combining smart tools with robust security practices is the winning strategy

📩 Have questions or thoughts?

Reach out at [email protected]!

🎙️ Follow Threat Talks for weekly cybersecurity insights.=== ► YOUTUBE: https://youtube.com/@ThreatTalks► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520👕 Receive your Threat Talks T-shirthttps://threat-talks.com/breaking-the-defenses-edr-bypass/🗺️ Explore the Hack's Route in Detail 🗺️https://threat-talks.com/downloads/🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

  continue reading

90 episodes

Todos os episódios

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play