Episode 66 — Resist Brute Force and Phishing: Credential Defense and Access Hygiene
Failed to add items
Add to basket failed.
Add to Wish List failed.
Remove from Wish List failed.
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
This episode focuses on credential-focused threats and how they translate into database risk, because exam scenarios frequently involve suspicious logins, account lockouts, or unexpected privilege use that begins with stolen credentials rather than a software exploit. You’ll learn how brute force and credential stuffing differ, what their telemetry looks like, and why controls like lockout thresholds, adaptive authentication, IP reputation filtering, and multi-factor options matter for database entry points. Phishing will be discussed as an access hygiene problem that spans users, administrators, and service identities, including how attackers target privileged accounts and use harvested credentials to access data quietly. We’ll cover defensive habits such as enforcing least privilege, separating admin accounts from daily-use accounts, rotating and scoping service account secrets, and monitoring for anomalous access times, impossible travel, and unusual query patterns against sensitive tables. Scenario practice will include diagnosing a flood of failed logins without locking out legitimate services, responding to a suspected compromised DBA account while preserving evidence, and selecting the best combination of prevention and detection controls that reduce risk without making operations brittle. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.