Skip to the main content.
Partner Programs
Already a Partner?
The Value of Partnership with Netenrich

The-Value-of-Partnership-with-Netenrich

 

    Podcasts

    Featuring Netenrich DEATH Labs: Data Engineering, Analytics & Threat Hunting

     

    Welcome to the DEATH* Labs Podcast

    John Bambenek, renowned cybersecurity expert and Principal Threat Hunter at Netenrich, interviews fellow security leaders on the latest cyberattacks and what you should do now to avoid them. Get insights on advanced threat hunting, detection, and response techniques. Catch conversations on the cutting edge of cybersecurity, with plenty of wit, for security experts and newbies alike. New episodes are released every other Wednesday.

    *Data Engineering, Analytics & Threat Hunting

    Playlist

    Recent Episodes

    Swimming in Muddy Waters

    Guest Allison Wickoff is Director of Global Threat Intelligence, Americas Lead at PwC.

    Muddy Waters is an active and prolific APT (advanced persistence threat) actor using unique tactics and malware.  Allison Wikoff, an expert Muddy Waters, joins John Babenek to discuss its techniques and implications for enterprise defenses. Listen>

    John Bambenek and Alison Wickoff

    Can ChatGPT Help Malware Analysts?

    Guest Juan Andres Guerrero-Saade is Adjunct Professor of Strategic Studies at Johns Hopkins School of Advanced International Studies (SAIS) and Principal Threat Researcher at SentinelOne.

    In this episode, John and Juan Andres Guerrero-Saade discuss how security analysts and those teaching the next generation of cyber security professionals can use language learning models. Listen>

    Episode 3 Final Graphic-1

     

    Threat Hunting: Finding Malicious Phishing Domains

    Guest Ed Gibbs is Field CTO at Whois API, a private cyber threat and market intelligence leader.

    John and Ed Gibbs discuss the rise of domain clustering of malicious phishing domains that security analysts need to care about. Ed shares enlightening techniques on how to find, investigate and resolve these types of daily attacks. Listen>

    Podcase John Babenek and Ed Gibbs

     

    Related reading

    Trusted by
    Google_2015_logo multicare-logo-vector-pp3fy10m0zwf2wme5mbq0dng2rgecjqupz72zp2s5c SADA logo udt_logo_200.2 agiliti-pp3fy2waenyzq4jnun4z5d6d9j74rxybe8i1y8zzsw (1) trace3-inc-logo-vector OpsRamp_Logo_Gray_Blue_RGB GreenPages Logo cdi-customer-logo-pp3fy10m0zwf2wme5mbq0dng2rgecjqupz72zp2s5c