• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Surveys
  • Partners
    • Request a Briefing
    • Become a Partner
    • Landing Pages
    • Bookings
      • Approved Interview Form
      • Approved Interview Form – Returning Guest
      • Book a Conference Interview
      • Conference Collection Form
  • Hosts
  • Company
    • About
    • Contact
    • Careers

Articles

The Three Most Common Tools Used to Breach Systems

Paul Asadoorian June 19, 2013

Topic

The vast majority of cyber attacks do not use advanced malware. Rather, attackers use whatever they need to do the job. In this webcast, John Strand and Paul Asadoorian discuss the three most common tools used by attackers to gain access to a system. Attendees will understand that smart security professionals will use the same three tools to find and plug up vulnerabilities in their systems, thus preventing these attacks from occurring.

Slides

Give Me Three Things: Anti-Virus Bypass Made Easy from Security Weekly

When

Tuesday, June 04, 2013 at 1:30 PM EDT (1730 UTC/GMT)

Presenters

John Strand and Paul Asadoorian
Register here To Listen To The Archive Recording

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

abstract-technology-science-concept-brain-digital-link-binary-hi-tech-blue-background_36402-92

Articles /

Selecting the Right Brain for Your Sensors

AdobeStock_145255314-1013x440

Articles /

Security Awareness Training – Time for a Change in Philosophy?

CT_web_featured_3_20_20

Articles /

How Can We Vaccinate Our Networks?

‹ Creating Malicious Firmware with Firmware-Mod-Kit › Book Review: The Practice of Network Security Monitoring

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS Feed RSS - Posts

Search

Follow Us On Twitter

→ Follow Us
© Security Weekly 2021
Powered by WordPress • Themify WordPress Themes