Episode 216: Cat Self

MITRE ATT&CK is a framework to explain how networks get penetrated and the techniques attackers use to move laterally and attack other devices. What does this mean for Apple devices? How can we best protect Macs and iOS devices? What are the philosophies? In this episode, we’ll chat with an Adversary Engineer at MITRE ATT&CK, Cat Self, who takes us through what MITRE ATT&CK is and what the framework means for administrators.

Guests:

Hosts:

  • Tom Bridge, Principal Product Manager, JumpCloud – @tbridge777
  • Charles Edge, CTO, Bootstrappers.mn – @cedge318
  • Marcus Ransom, Apple Systems Architect, CompNow – @marcusransom

Listen:

Sponsor:

Links:

Patreon Sponsors:

The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson

Mac Admins Podcast Community Calendar, Sponsored by Watchman Monitoring

Sponsor the Mac Admins Podcast:

If you’re interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information.

Social Media:

Get the latest about the Mac Admins Podcast, follow us on Twitter! We’re @MacAdmPodcast!


One Reply to “Episode 216: Cat Self”

  1. Vince Coe

    Do you normalize the audio? The audio levels for the podcast are all over the place. I have found that these settings in a ffmpeg stream are very good. “dynaudnorm=f=200:g=19:p=0.95:m=24:r=0.27:s=0, volume=.95”

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back MAP on Patreon



Support the podcast by becoming a backer on Patreon. All backer levels get access to exclusive content!

Subscribe

Archives