4.8 • 1K Ratings
🗓️ 13 December 2017
⏱️ 30 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome we're going to |
0:15.0 | to malicious life. I'm Ran Levy and today we're going to talk about |
0:18.4 | deception in cybersecurity. security. |
0:27.0 | Deception is not something we usually think of when we think about defense in the information security world. |
0:34.0 | True, deception is one of the most common tools in an attacker's arsenal, |
0:38.0 | but when it comes to protection, |
0:41.0 | the first picture that comes to mind is often the small icon of an antivirus |
0:46.4 | software in the corner of your desktop. |
0:49.5 | For many years, the guiding method in the world of information security was detection by identifying |
0:55.7 | signature or unusual behavior patterns within a network. |
1:00.4 | But in recent years, deception, although not a new idea in the world of information security, |
1:06.4 | has experienced a kind of renaissance. |
1:10.0 | There has been a gradual but clear transition from defense through detection to defense in other ways. |
1:18.0 | Why? Because experience has repeatedly shown us that static defense is not enough. |
1:25.0 | Hackers and malicious software are getting more and more sophisticated and every week |
1:30.0 | we hear about a multi-million dollar company getting hacked despite all detection and prevention measures. |
1:37.0 | More and more people realize that we need to rethink our defenses. |
1:42.0 | And when deception is involved, you don't even need to think like an |
1:46.7 | information security professional. It can even be, say, an astronomer. |
2:00.0 | Dr Clifford Stahl looks like how you would expect an astronomer to look. His frame is lean and wiry, his hair long and wild, his clothes a bit crumpled, and when he speaks, he is bouncy, full of exuberant enthusiasm and exaggerated hand gestures. |
2:14.8 | In 1986, the year our story takes place, Stahl worked at Lawrence Berkeley Laboratory, LBL in short, a research institute that was one of the |
2:25.8 | handful of universities and commercial companies connected to Arpenet, the military |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.