Podcast: Play in new window | Download
Subscribe: Apple Podcasts | RSS
TechSpective Podcast Episode 089
There is no such thing as perfect or invulnerable cybersecurity. The goal of cybersecurity is to raise the bar or cost of entry to make it as challenging as possible for threat actors, and to detect and identify new threats as quickly as possible. Given the sheer size of the threat landscape and the volume of threats, it\’s also important to automate as much as possible.
There are tons of cybersecurity tools out there, but even with a comprehensive mix of solutions in place there can be gaps–unnecessary exposure to risk. Rajiv Kulkarni, Senior Security Engineer, Incident Response with Adobe, joins me on this episode to talk about the malware analysis pipeline he and his team have developed and implemented to take binaries that are not recognized by the cybersecurity tools in place and perform an automated analysis of them that helps protect Adobe from emerging threats.
Check out the full episode for more about the challenges of identifying and stopping unknown malicious threats and how Adobe developed and implemented its malware analysis pipeline.
The podcast itself is audio-only, but the video of our conversation is also available on YouTube if you prefer:
Please ask questions and share your thoughts on the topic in the comments below. Also, please subscribe to the TechSpective Podcast through your favorite podcast platform and share the podcast with your peers and friends.
If you enjoy the podcast, I would also be grateful if you could take 2 minutes to rate and review the podcast on iTunes or wherever you listen.
- Navigating the Future of Secure Code Signing and Cryptography - December 20, 2024
- The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce - December 20, 2024
- Exploring the Evolution of Cybersecurity Marketing - December 18, 2024
Pingback: Rajiv Kulkarni Talks about the Malware Analysis Pipeline – TechSpective – 152news
Pingback: Best Practices for Securing Open Ports Identified by Nmap