Don't Panic: The Unit 42 Podcast

Don't Panic: The Unit 42 Podcast

30 episodes

Don't Panic! is the official podcast from Unit 42 at Palo Alto Networks. We find the big issues that are frustrating cyber security practitioners and help simplify them so they don't need to panic.

Podcasts

Threat Intelligence (LIVE!)

Published: Oct. 20, 2019, 10 a.m.
Duration: 37 minutes 42 seconds

Listed in: Technology

Artificial Intelligence and Machine Learning

Published: Oct. 13, 2019, 10 a.m.
Duration: 15 minutes 28 seconds

Listed in: Technology

Powershell

Published: Oct. 6, 2019, 10 a.m.
Duration: 14 minutes 30 seconds

Listed in: Technology

Lateral Movement

Published: Sept. 29, 2019, 10 a.m.
Duration: 14 minutes 39 seconds

Listed in: Technology

Insider Threats

Published: May 28, 2019, 4 a.m.
Duration: 16 minutes 34 seconds

Listed in: Technology

Tech Support Scams

Published: May 3, 2019, 3:22 p.m.
Duration: 15 minutes 52 seconds

Listed in: Technology

Watering Holes

Published: April 26, 2019, 7 a.m.
Duration: 10 minutes 23 seconds

Listed in: Technology

DNS Tunneling

Published: April 12, 2019, 7 a.m.
Duration: 14 minutes 27 seconds

Listed in: Technology

Adversary Playbooks

Published: Jan. 18, 2019, 4:13 p.m.
Duration: 20 minutes 41 seconds

Listed in: Technology

Transitioning from STIX 1 to STIX 2

Published: Jan. 14, 2019, 10 a.m.
Duration: 22 minutes 25 seconds

Listed in: Technology

Cyber Insurance

Published: Jan. 7, 2019, 1 p.m.
Duration: 18 minutes 40 seconds

Listed in: Technology

Fileless Attacks

Published: Dec. 31, 2018, 10 a.m.
Duration: 14 minutes 37 seconds

Listed in: Technology

Business Email Compromise

Published: Dec. 24, 2018, 10 a.m.
Duration: 16 minutes 16 seconds

Listed in: Technology

Mitre's ATT&CK Framework

Published: Dec. 17, 2018, 10 a.m.
Duration: 18 minutes 9 seconds

Listed in: Technology

Cyber Reconnaissance

Published: Dec. 10, 2018, 10 a.m.
Duration: 16 minutes 15 seconds

Listed in: Technology

Measuring Cyber Security Risk

Published: Dec. 3, 2018, 10 a.m.
Duration: 18 minutes 31 seconds

Listed in: Technology

Threat Actor Naming

Published: July 30, 2018, 4 p.m.
Duration: 14 minutes 16 seconds

Listed in: Technology

ioT Botnets

Published: July 3, 2018, 4 p.m.
Duration: 15 minutes 7 seconds

Listed in: Technology

Software Supply Chain Attacks

Published: June 20, 2018, 4 p.m.
Duration: 23 minutes 19 seconds

Listed in: Technology

The Cloud

Published: May 31, 2018, 4 p.m.
Duration: 18 minutes 57 seconds

Listed in: Technology

Endpoints

Published: May 31, 2018, 4 p.m.
Duration: 16 minutes 21 seconds

Listed in: Technology

Cryptocurrency

Published: April 16, 2018, 4 p.m.
Duration: 21 minutes 21 seconds

Listed in: Technology

Password Management

Published: March 25, 2018, 4 p.m.
Duration: 16 minutes 51 seconds

Listed in: Technology

Data Breaches

Published: March 25, 2018, 4 p.m.
Duration: 13 minutes 7 seconds

Listed in: Technology

Adversary Motivations

Published: March 25, 2018, 4 p.m.
Duration: 14 minutes 20 seconds

Listed in: Technology

Blackhat 2015

Published: Sept. 14, 2015, 4 p.m.
Duration: 18 minutes 28 seconds

Listed in: Technology

Cyber Attack Attribution

Published: June 15, 2015, 4 p.m.
Duration: 24 minutes 8 seconds

Listed in: Technology

The Cybersecurity Canon

Published: May 5, 2015, 4 p.m.
Duration: 25 minutes 41 seconds

Listed in: Technology

Backdoored Cryptographic Systems

Published: April 13, 2015, 4 p.m.
Duration: 29 minutes 39 seconds

Listed in: Technology

Cybersecurity Information Sharing

Published: March 2, 2015, 5 p.m.
Duration: 21 minutes 40 seconds

Listed in: Technology