Endpoints Of View – Cybersecurity Podcast

By: SentryBay Limited
  • Summary

  • Endpoints Of View is your go-to podcast for in-depth expert discussions on cybersecurity topics that touch data breaches, credential theft and endpoint security. Information security professionals can tune in for fresh perspectives on defending secure cloud infrastructure, platforms, and applications from info-stealing threat actors deploying Keylogging, Screen Capture, and Malicious Injection malware.

    Episodes are brought to you by SentryBay®, the OEM at the heart of Citrix App Protection. SentryBay's Armored Client solution mitigates against credential theft and data leakage threats securing all major VDI, DaaS and Web environments, client types and operating systems.

    © SentryBay Limited
    Show More Show Less
Episodes
  • Cybersecurity Risks in the Middle East
    Jan 14 2025

    The Middle East is experiencing rapid digital transformation and economic growth, making it an increasingly attractive target for cyberattacks.

    While historically the region has seen a relatively low number of publicized cyber incidents, the potential impact of a successful attack is significant, due to the region's crucial role in the global energy sector and its growing dependence on digital technologies. The costs of data breaches in the region are already high, and various cyber threats are becoming more sophisticated. This briefing outlines the key vulnerabilities, risks, and necessary steps for mitigating potential cyber threats in the Middle East.

    Talking Points:

    • High Potential Impact to Energy Sector: The energy sector is considered one of the most important and sensitive sectors that must be protected from cyber attacks due to the devastating impact this sector might have on Middle Eastern economies.Geopolitical Tensions Exacerbate Risk: Complicating matters is geopolitical tension in parts of the Middle East: With its escalation, any high-profile or state-owned businesses will be at increased risk of cyber attacks from hacktivists.

    Proactive cybersecurity solutions that isolate endpoints and prevent credential-based exploits are essential for organizations in the Middle East to safeguard their infrastructure, maintain operational trust, and ensure resilience against evolving cyber threats.

    Show More Show Less
    13 mins
  • SentryBay Wrapped – Devastating Data Breaches Of 2024 & More!
    Dec 10 2024

    This year-end episode of the Endpoints Of View podcast discusses the significant rise in cyberattacks globally in 2024, with a 75% increase in weekly averages compared to 2023. All sectors are vulnerable, but education, government, healthcare, and communications are prime targets. Also under discussion is the news that SentryBay is certified for meeting the requirements of ISO 27001 for the development, supply, maintenance and support of IT security software products and the provision of SaaS solutions worldwide.

    Talking Points:

    Increased Data breaches: Several high-profile data breaches exposed sensitive personal information, leading to financial losses and reputational damage for organizations and individuals:

    • Change Healthcare: Exposed protected health information of 100 million individuals, making it the largest healthcare data breach in US history.
    • Synnovis: Ransomware attack crippled pathology services across London, impacting hundreds of thousands of patients and demonstrating the fragility of critical healthcare infrastructure.
    • Ticketmaster: Over 500 million customer records stolen by ShinyHunters, likely exploiting a vulnerability in a third-party cloud data warehouse.
    • AT&T: Unauthorized access and download of call and text records of nearly all AT&T customers, highlighting privacy concerns and risks associated with third-party cloud platforms.
    • Dell: “Grep” accessed and stole data belonging to over 10,000 employees and partners, likely through a phishing campaign.
    • MediSecure: Ransomware attack compromised personal and health information of 12.9 million Australians, making it one of the largest healthcare data breaches in the country.
    • Snowflake Attacks: UNC5537 targeted Snowflake customers, exploiting compromised credentials to access data. The attacks highlighted the importance of multi-factor authentication.

    Importance of ISO 27001 Certification: SentryBay, a leader in endpoint isolation technology, achieved ISO 27001 certification, demonstrating its commitment to information security best practices. The certification provides clients and partners with peace of mind, knowing that SentryBay’s technology aligns with data protection and information security standards.

    Show More Show Less
    14 mins
  • Special Edition: International Fraud Awareness Week (IFAW)
    Nov 19 2024

    International Fraud Awareness Week 2024 (IFAW) serves as a critical reminder of the growing threat of fraud and the importance of robust data security measures for businesses and individuals. This special IFAW edition of SentryBay’s Endpoints Of View podcast provides insights into the evolving fraud landscape, highlighting key threats, costs, prevention strategies, and the critical role of endpoint security.

    Talking Points:

    1. The Escalating Threat of Fraud in a Digital World:

    • Fraudulent activities are increasing at an alarming rate, fueled by rapid digitization and advanced technologies like AI.
    • Cybercriminals leverage AI for sophisticated attacks, including creating fake identities, phishing scams, forging documents, and impersonation using voice cloning and deepfakes.

    2. The High Cost of Data Breaches:

    • The global average cost of a data breach reached $4.45 million in 2024, encompassing financial losses, reputational damage, regulatory fines, and remediation costs.
    • Data breaches erode trust among customers and employees, leading to irreparable reputational harm and potential identity theft.

    3. Key Cyber Threats:

    • Keylogging: Malicious software or hardware records a user's keystrokes to capture sensitive information.
    • Screen Capture: Cybercriminals take screenshots of a victim's device to reveal sensitive data displayed on the screen.
    • Malicious Injection: Harmful code is inserted into legitimate applications or websites to compromise databases and critical infrastructure.
    • Insider Threats: Employees, contractors, or suppliers with insider access can intentionally or unintentionally compromise data security, leading to data theft, sabotage, or data leaks.

    4. The Crucial Role of Endpoint Security:

    • Endpoint security serves as the frontline defense against cyber threats, protecting devices like desktops, laptops, and mobile phones.
    • Key features include real-time threat detection, multi-layered defense, behavioral analytics, and patch management.

    5. Building a Culture of Fraud Prevention:

    • Employee education and training are paramount to help staff recognize phishing attempts, report suspicious activity, and adhere to best practices.
    • Organizations must establish robust fraud risk assessment procedures and incident response plans.
    • A culture of transparency and trust encourages employees to report suspicious activities.

    6. Proactive Measures and Best Practices:

    • Implement comprehensive data protection measures to comply with regulations like GDPR and CCPA.
    • Adopt robust solutions with built-in prevention, detection, and real-time threat response capabilities.
    • Establish clear company policies, least-privilege access controls, and monitoring capabilities to mitigate insider threats.
    Show More Show Less
    22 mins

What listeners say about Endpoints Of View – Cybersecurity Podcast

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.